[Bug 2073786] Re: [24.10 FEAT] [LDP2018] Upgrade s390-tools to latest version (v2.34.0)

2024-08-01 Thread Frank Heimes
debdiffs for s390-tools and s390-tools-signed

** Attachment added: "debdiffs.tgz"
   
https://bugs.launchpad.net/ubuntu/+source/s390-tools/+bug/2073786/+attachment/5802000/+files/debdiffs.tgz

** Changed in: ubuntu-z-systems
   Status: Triaged => In Progress

** Changed in: s390-tools (Ubuntu Oracular)
   Status: Triaged => In Progress

** Changed in: s390-tools-signed (Ubuntu Oracular)
   Status: Triaged => In Progress

** Information type changed from Private to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073786

Title:
  [24.10 FEAT] [LDP2018] Upgrade s390-tools to latest version (v2.34.0)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2073786/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2074380] Re: [UBUNTU 22.04] s390/cpum_cf: make crypto counters upward compatible

2024-08-01 Thread Frank Heimes
Test builds were done here:
https://launchpad.net/~fheimes/+archive/ubuntu/lp2074380

Submissions to the kernel teams mailing list was done:
https://lists.ubuntu.com/archives/kernel-team/2024-August/thread.html#152551

** Changed in: linux (Ubuntu Jammy)
 Assignee: Frank Heimes (fheimes) => Canonical Kernel Team 
(canonical-kernel-team)

** Changed in: linux (Ubuntu Noble)
 Assignee: Frank Heimes (fheimes) => Canonical Kernel Team 
(canonical-kernel-team)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2074380

Title:
  [UBUNTU 22.04] s390/cpum_cf: make crypto counters upward compatible

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2074380/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2074380] Re: [UBUNTU 22.04] kernel: s390/cpum_cf: make crypto counters upward compatible

2024-08-01 Thread Frank Heimes
** Description changed:

  SRU Justification:
  
  [ Impact ]
  
-  * The CPU Measurement Facility (CPU MF) crypto counter set
-is not listed in the device sysfs tree - it's not exported
-in the sysfs directory /sys/devices/cpum_cf/events.
+  * The CPU Measurement Facility (CPU MF) crypto counter set
+    is not listed in the device sysfs tree - it's not exported
+    in the sysfs directory /sys/devices/cpum_cf/events.
  
-  * The attribute files for each CPU-MF counter defined
-in the crypto counter set is missing.
+  * The attribute files for each CPU-MF counter defined
+    in the crypto counter set is missing.
  
-  * This is caused by the counter second version number of CPU MF
-hardware being incremented on new machines.
+  * This is caused by the counter second version number of CPU MF
+    hardware being incremented on new machines.
  
-  * This causes a sanity check to fail,
-but the counters are supported by hardware.
+  * This causes a sanity check to fail,
+    but the counters are supported by hardware.
  
-  * The solution is to remove the upper limit in counter second
-version number check.
+  * The solution is to remove the upper limit in counter second
+    version number check.
  
  [ Fix ]
  
-  * f10933cbd2df f10933cbd2dfddf6273698a45f76db9bafd8150f "s390/cpum_cf:
- make crypto counters upward compatible across machine types"
+  * f10933cbd2df f10933cbd2dfddf6273698a45f76db9bafd8150f
+"s390/cpum_cf: make crypto counters upward compatible across machine types"
  
-  * The fix was upstream accepted with kernel v6.10(-rc1).
+  * The fix was upstream accepted with kernel v6.10(-rc1).
+ 
+  * Upstream commit applies cleanly on noble master-next, 
+but needed to be backported to jammy master-next due to different code
+and context in kernel 5.15.
  
  [ Test Plan ]
  
-  * Run the following commands on a new machine generation:
-(hence only doable by IBM)
-# ls -l /sys/devices/cpum_cf/events/ | grep AES
-
-  * If the output is empty than this patch is required.
+  * Run the following commands on a new machine generation:
+    (hence only doable by IBM)
+    # ls -l /sys/devices/cpum_cf/events/ | grep AES
  
-  * With a patched kernel the output should be like:
-# ls /sys/devices/cpum_cf/events/ | grep AES
-AES_BLOCKED_CYCLES
-AES_BLOCKED_FUNCTIONS
-AES_CYCLES
-AES_FUNCTIONS
+  * If the output is empty than this patch is required.
+ 
+  * With a patched kernel the output should be like:
+    # ls /sys/devices/cpum_cf/events/ | grep AES
+    AES_BLOCKED_CYCLES
+    AES_BLOCKED_FUNCTIONS
+    AES_CYCLES
+    AES_FUNCTIONS
  
  [ Where problems could occur ]
  
-  * This affects s390x only - CPU MF is s390-specific,
-and only s390 specific code is modified.
+  * This affects s390x only - CPU MF is s390-specific,
+    and only s390 specific code is modified.
  
-  * And it furthermore is limited to the crypto counter set
-of CPU MF.
+  * And it furthermore is limited to the crypto counter set
+    of CPU MF.
  
-  * So any impact is likely limited to hardware crypto counters
-on s390x only.
+  * So any impact is likely limited to hardware crypto counters
+    on s390x only.
  
-  * In s390/kernel/perf_cpum_cf.c the else if case got changed from
-explicitly checking for 6 or 7 to >= 6 which seems to require
-attention for future 8 and more cases.
+  * In s390/kernel/perf_cpum_cf.c the else if case got changed from
+    explicitly checking for 6 or 7 to >= 6 which seems to require
+    attention for future 8 and more cases.
  
-  * In s390/kernel/perf_cpum_cf_events.c the switch (ci.csvn) statement
-was changed to an if / else if with similar logic.
-Again attentioin for any potential future cases >= 8.
+  * In s390/kernel/perf_cpum_cf_events.c the switch (ci.csvn) statement
+    was changed to an if / else if with similar logic.
+    Again attentioin for any potential future cases >= 8.
  
-  * It does not look like currently used cases (1..5 and 6..7)
-are affected by the modification, just >7.
+  * It does not look like currently used cases (1..5 and 6..7)
+    are affected by the modification, just >7.
  
-  * Test build of patched jammy and noble s390x kernels were build
-and are avaiable here:
-https://launchpad.net/~fheimes/+archive/ubuntu/lp2074380
+  * Test build of patched jammy and noble s390x kernels were build
+    and are avaiable here:
+    https://launchpad.net/~fheimes/+archive/ubuntu/lp2074380
  
  [ Other Info ]
-  
-  * Since the code/fix was upstream accepted with kernel v6.10(-rc1)
-it does not affect the current development release oracular.
  
-  * This SRU can also be seen under the umbrella of new
- hardware enablement.
+  * Since the code/fix was upstream accepted with kernel v6.10(-rc1)
+    it does not affect the current development release oracular.
  
-  * Since it requires special hw, the verification needs to be
-done by IBM.
+  * This SRU can also 

[Bug 2074380] Re: [UBUNTU 22.04] kernel: s390/cpum_cf: make crypto counters upward compatible

2024-08-01 Thread Frank Heimes
s/cpum_cf/events/ | grep AES
+ AES_BLOCKED_CYCLES
+ AES_BLOCKED_FUNCTIONS
+ AES_CYCLES
+ AES_FUNCTIONS
+ #
  
  Upstream-ID of fix:   f10933cbd2dfddf6273698a45f76db9bafd8150f

** Changed in: linux (Ubuntu Jammy)
     Assignee: (unassigned) => Frank Heimes (fheimes)

** Changed in: linux (Ubuntu Noble)
 Assignee: (unassigned) => Frank Heimes (fheimes)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2074380

Title:
  [UBUNTU 22.04] kernel: s390/cpum_cf: make crypto counters upward
  compatible

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2074380/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2074380] Re: [UBUNTU 22.04] kernel: s390/cpum_cf: make crypto counters upward compatible

2024-08-01 Thread Frank Heimes
Hello Thomas, thank you!
Was also my impression that a backport is probably best.
And the backport applies cleanly on jammy master-next (so yes, that is what we 
have to use for the next and upcoming kernel of an Ubuntu release).

Proceeding now with the kernel SRU ...

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2074380

Title:
  [UBUNTU 22.04] kernel: s390/cpum_cf: make crypto counters upward
  compatible

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2074380/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2073372] Re: [UBUNTU 20.04] s390x: z13 wcsncmp implementation segfaults if n=1

2024-08-01 Thread Frank Heimes
** Also affects: glibc (Ubuntu Noble)
   Importance: Undecided
   Status: New

** Also affects: glibc (Ubuntu Oracular)
   Importance: Undecided
   Status: New

** Also affects: glibc (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: glibc (Ubuntu Focal)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073372

Title:
  [UBUNTU 20.04] s390x: z13 wcsncmp implementation segfaults if n=1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2073372/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2075491] Re: binary16 float-point arithmetic crashes LLVM on s390x

2024-08-01 Thread Frank Heimes
** Also affects: ubuntu-z-systems
   Importance: Undecided
   Status: New

** Tags added: reverse-proxy-bugzilla s390x

** Changed in: ubuntu-z-systems
 Assignee: (unassigned) => bugproxy (bugproxy)

** Changed in: llvm-toolchain-18 (Ubuntu)
   Importance: Undecided => Medium

** Changed in: ubuntu-z-systems
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2075491

Title:
  binary16 float-point arithmetic crashes LLVM on s390x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2075491/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2027925] Re: [25.04 FEAT] [VS2218] KVM: Implement virsh hypervisor-cpu-models (libvirt)

2024-07-31 Thread Frank Heimes
** Summary changed:

- [24.10 FEAT] [VS2218] KVM: Implement virsh hypervisor-cpu-models (libvirt)
+ [25.04 FEAT] [VS2218] KVM: Implement virsh hypervisor-cpu-models (libvirt)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2027925

Title:
  [25.04 FEAT] [VS2218] KVM: Implement virsh hypervisor-cpu-models
  (libvirt)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2027925/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2049701] Re: [25.04 FEAT] [VS2009] KVM: Secure IPL Simulation - libvirt part

2024-07-31 Thread Frank Heimes
** Summary changed:

- [24.10 FEAT] [VS2009] KVM: Secure IPL Simulation - libvirt part
+ [25.04 FEAT] [VS2009] KVM: Secure IPL Simulation - libvirt part

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2049701

Title:
  [25.04 FEAT] [VS2009] KVM: Secure IPL Simulation - libvirt part

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2049701/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2049698] Re: [25.04 FEAT] [VS1807] KVM: Full boot order support (qemu)

2024-07-31 Thread Frank Heimes
** Summary changed:

- [24.10 FEAT] [VS1807] KVM: Full boot order support (qemu)
+ [25.04 FEAT] [VS1807] KVM: Full boot order support (qemu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2049698

Title:
  [25.04 FEAT] [VS1807] KVM: Full boot order support (qemu)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2049698/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2049702] Re: [25.04 FEAT] [VS2009] KVM: Secure IPL Simulation - qemu part

2024-07-31 Thread Frank Heimes
** Summary changed:

- [24.10 FEAT] [VS2009] KVM: Secure IPL Simulation - qemu part
+ [25.04 FEAT] [VS2009] KVM: Secure IPL Simulation - qemu part

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2049702

Title:
  [25.04 FEAT] [VS2009] KVM: Secure IPL Simulation - qemu part

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2049702/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2074380] Re: [UBUNTU 22.04] kernel: s390/cpum_cf: make crypto counters upward compatible

2024-07-31 Thread Frank Heimes
The commit applies fine to the noble master-next tree (kernel 6.8),
and a test build was triggered here: 
https://launchpad.net/~fheimes/+archive/ubuntu/lp2074380

However, the cpumf code in jammy master-next (kernel 5.15) is quite different.
git blame tells me that probably the following commits are needed as well:
111783-1a33aee1dc24 s390/cpum_cf: remove function validate_ctr_auth() by inline 
code
111784-9ae9b868aeaa s390/cpum_cf: provide counter number to 
validate_ctr_version()
111785:46c4d945ea1f s390/cpum_cf: introduce static CPU counter facility 
information
but they (first of all 46c4d945ea1f) also do not apply cleanly.

Would you please let us know a minimal set of patches (based on your insights 
of the code) that let us apply f10933cbd2df to the jammy master-next tree (git 
clone git://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/jammy 
--branch master-next --single-branch)
or alternatively a backport of f10933cbd2df to this tree?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2074380

Title:
  [UBUNTU 22.04] kernel: s390/cpum_cf: make crypto counters upward
  compatible

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2074380/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2075204] Re: gdb on s390x chokes on divide-by-zero from chaos-marmosets

2024-07-31 Thread Frank Heimes
** Tags added: reverse-proxy-bugzilla s390x

** Also affects: ubuntu-z-systems
   Importance: Undecided
   Status: New

** Changed in: ubuntu-z-systems
 Assignee: (unassigned) => bugproxy (bugproxy)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2075204

Title:
  gdb on s390x chokes on divide-by-zero from chaos-marmosets

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2075204/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064319] Re: Power guest secure boot with key management: GRUB2 portion

2024-07-30 Thread Frank Heimes
Thanks to Mate there is now an initial draft version of grub2 available in this 
PPA:
https://launchpad.net/~mkukri/+archive/ubuntu/power-grub/+packages
(https://code.launchpad.net/~ubuntu-uefi-team/grub/+git/ubuntu/+ref/power-sb)
that has the patch set merged (and some issues fixed with the patch set) -- but 
it's untested yet.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064319

Title:
  Power guest secure boot with key management: GRUB2 portion

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2064319/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064319] Re: Power guest secure boot with key management: GRUB2 portion

2024-07-30 Thread Frank Heimes
** Changed in: ubuntu-power-systems
 Assignee: (unassigned) => Ubuntu on IBM Power Systems Bug Triage 
(ubuntu-power-triage)

** Changed in: grub2 (Ubuntu)
 Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage) => 
(unassigned)

** Changed in: ubuntu-power-systems
   Importance: Undecided => Critical

** Changed in: grub2 (Ubuntu)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064319

Title:
  Power guest secure boot with key management: GRUB2 portion

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2064319/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2074380] Re: [UBUNTU 22.04] kernel: s390/cpum_cf: make crypto counters upward compatible

2024-07-29 Thread Frank Heimes
** Also affects: linux (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Noble)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
   Status: New => Fix Released

** Also affects: ubuntu-z-systems
   Importance: Undecided
   Status: New

** Changed in: ubuntu-z-systems
   Importance: Undecided => High

** Changed in: linux (Ubuntu Jammy)
   Importance: Undecided => High

** Changed in: linux (Ubuntu Noble)
   Importance: Undecided => High

** Changed in: ubuntu-z-systems
 Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team)

** Changed in: linux (Ubuntu)
 Assignee: Skipper Bug Screeners (skipper-screen-team) => (unassigned)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2074380

Title:
  [UBUNTU 22.04] kernel: s390/cpum_cf: make crypto counters upward
  compatible

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2074380/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959972] Re: [22.10 FEAT] KVM: Tool to process encrypted Secure Execution guest dumps (s390-tools)

2024-07-29 Thread Frank Heimes
To get this as SRU into jammy/22.04, we would need a list of commits
(maybe backports) that fit to s390-tools 2.20.0-0ubuntu3.3, that we
currently have in jammy.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959972

Title:
  [22.10 FEAT] KVM: Tool to process encrypted Secure Execution guest
  dumps (s390-tools)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959972/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959966] Re: [23.04 FEAT] KVM: Secure Execution guest dump encryption with customer keys - qemu part

2024-07-29 Thread Frank Heimes
To get this as SRU into jammy/22.04, we would need a list of commits
(maybe backports) that fit to qemu 6.2 that we have in jammy.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959966

Title:
  [23.04 FEAT] KVM: Secure Execution guest dump encryption with customer
  keys - qemu part

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959966/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959940] Re: [22.10 FEAT] KVM: Secure Execution guest dump encryption with customer keys - kernel part

2024-07-29 Thread Frank Heimes
To get this as SRU into 22.04/jammy, backports of the above commits are needed 
that fit to:
git clone 
git://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/jammy --branch 
master-next --single-branch

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959940

Title:
  [22.10 FEAT] KVM: Secure Execution guest dump encryption with customer
  keys - kernel part

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959940/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1856682] Re: [UBUNTU 20.04] GCC Miscompilation in vectorized code

2024-07-28 Thread Frank Heimes
Changing bionic entries to Won't Fix, since the base support ended.

** Changed in: gcc-5 (Ubuntu Bionic)
   Status: New => Won't Fix

** Changed in: gcc-6 (Ubuntu Bionic)
   Status: New => Won't Fix

** Changed in: gcc-7 (Ubuntu Bionic)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1856682

Title:
  [UBUNTU 20.04] GCC Miscompilation in vectorized code

To manage notifications about this bug go to:
https://bugs.launchpad.net/gcc/+bug/1856682/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2050018] Re: [24.10 FEAT] [SEC2356] openCryptoki ep11 token: support protected keys for extractable keys

2024-07-26 Thread Frank Heimes
** Changed in: ubuntu-z-systems
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2050018

Title:
  [24.10 FEAT] [SEC2356] openCryptoki ep11 token: support protected keys
  for extractable keys

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2050018/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2050018] Re: [24.10 FEAT] [SEC2356] openCryptoki ep11 token: support protected keys for extractable keys

2024-07-26 Thread Frank Heimes
** Changed in: ubuntu-z-systems
   Status: Triaged => Fix Committed

** Changed in: opencryptoki (Ubuntu)
   Status: Triaged => Fix Committed

** Information type changed from Private to Public

** Changed in: opencryptoki (Ubuntu)
 Assignee: (unassigned) => Frank Heimes (fheimes)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2050018

Title:
  [24.10 FEAT] [SEC2356] openCryptoki ep11 token: support protected keys
  for extractable keys

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2050018/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069040] Re: Compile glibc for Power9

2024-07-26 Thread Frank Heimes
** Changed in: ubuntu-power-systems
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069040

Title:
  Compile glibc for Power9

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2069040/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2074191] Re: Binary RM of 32-bit binaries on s390x

2024-07-26 Thread Frank Heimes
** Tags added: s390x

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2074191

Title:
  Binary RM of 32-bit binaries on s390x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/2074191/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067350] Re: Removal of 31-bit (s390) glibc packages

2024-07-26 Thread Frank Heimes
** Changed in: ubuntu-z-systems
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067350

Title:
  Removal of 31-bit (s390) glibc packages

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2067350/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2073554] Re: Grub2 Support for KVM on PowerVM

2024-07-26 Thread Frank Heimes
** Also affects: grub2 (Ubuntu Noble)
   Importance: Undecided
   Status: New

** Also affects: grub2 (Ubuntu Oracular)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073554

Title:
  Grub2 Support for KVM on PowerVM

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2073554/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2032247] Re: [UBUNTU 23.04] S390: static-PIE programs segfaults if libc6-dev-s390x-cross package is installed

2024-07-25 Thread Frank Heimes
Based on the fact that 23.04 reached it's EOL and with the confirmation
in comment #10 that noble is working, I'm closing this bug.

** No longer affects: linux (Ubuntu)

** No longer affects: gcc-12-cross (Ubuntu)

** No longer affects: glibc (Ubuntu)

** No longer affects: gcc-13-cross (Ubuntu)

** Changed in: ubuntu-z-systems
   Status: New => Fix Released

** Changed in: ubuntu-z-systems
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2032247

Title:
  [UBUNTU 23.04] S390: static-PIE programs segfaults if
  libc6-dev-s390x-cross package is installed

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2032247/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072257] Re: s390-tools: fail to build after gcc-defaults 1.215ubuntu2

2024-07-24 Thread Frank Heimes
** Changed in: ubuntu-z-systems
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072257

Title:
  s390-tools: fail to build after gcc-defaults 1.215ubuntu2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072257/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072366] Re: s390-tools zipl breaks when user provides target attributes

2024-07-24 Thread Frank Heimes
** Changed in: ubuntu-z-systems
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072366

Title:
  s390-tools zipl breaks when user provides target attributes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072366/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072641] Re: [UBUNTU 22.04] KVM: s390: unhandled guest LPSWEY instruction

2024-07-24 Thread Frank Heimes
** Changed in: ubuntu-z-systems
   Status: New => Triaged

** Changed in: linux (Ubuntu)
   Status: New => Triaged

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072641

Title:
  [UBUNTU 22.04] KVM: s390: unhandled guest LPSWEY instruction

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072641/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2073082] Re: Upgrade qclib to latest version v2.5.0

2024-07-24 Thread Frank Heimes
** Changed in: ubuntu-z-systems
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073082

Title:
  Upgrade qclib to latest version v2.5.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2073082/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067350] Re: Removal of 31-bit (s390) glibc packages

2024-07-24 Thread Frank Heimes
** Changed in: ubuntu-z-systems
 Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team)

** Changed in: glibc (Ubuntu)
   Importance: Undecided => Medium

** Changed in: ubuntu-z-systems
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067350

Title:
  Removal of 31-bit (s390) glibc packages

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2067350/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2049924] Re: WireGuard broken on ppc64el Noble++

2024-07-23 Thread Frank Heimes
** Changed in: ubuntu-power-systems
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2049924

Title:
  WireGuard broken on ppc64el Noble++

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2049924/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1880834] Re: qeth: utilize virtual MAC for Layer2 OSD devices

2024-07-22 Thread Frank Heimes
** Description changed:

  SRU Justification:
  ==
  
  [Impact]
  
  * A qeth device on a DPM-managed (HMC) IBM Z machine does not obtain its
  MAC address for layer2 OSD interfaces from the OSA Network Adapter,
  instead it uses a random MAC address.
  
  * This can cause connectivity issues in environments where reliable and
  pre-determined MAC addresses are required, ie. when doing network
  configuration based on DHCP.
  
  [Fix]
  
  * Backport 1: https://launchpadlibrarian.net/481647649/0001-s390-qeth-
  improve-fallback-to-random-MAC-address.patch
  
  * Backport 2: https://launchpadlibrarian.net/481647657/0002-s390-qeth-
  utilize-virtual-MAC-for-Layer2-OSD-devices.patch
  
  [Test Case]
  
  * Bring up a qeth L2 OSD interface in DPM-managed (HMC) LPAR
  
  * Inspect the interface's MAC address. It should be the same as
  displayed in the HMC DPM panels.
  
- * Due to the fact that a system is needed where the HMC is in DPM moce
+ * Due to the fact that a system is needed where the HMC is in DPM mode
  (rather than in classic mode) this needs to be tested by IBM.
  
  [Regression Potential]
  
  * There is a certain risk for a regression, since OSA devices are the
- standard netweork devices on s390x.
+ standard network devices on s390x.
  
  * But static network configurations are still more popular for the
  usually long running workload on s390x and not dynamic assignments.
  
  * On the other hand qeth devices are s390x only, so this will at least
  not affect common code or code for other architectures.
  
  * The modifications are limited to drivers/s390/net/qeth_*.
  
  * The patches are upstream since quite a while, which speaks for their
  stability.
  
  [Other Info]
  
  * The upstream patch 21b1702af12e "s390/qeth: improve fallback to random
  MAC address" got upstream accepted with 4.18, hence is already in all
  Ubuntu release that are newer than bionic
  
  * And the upstream patch b144b99fff69 "s390/qeth: utilize virtual MAC
  for Layer2 OSD devices" got upstream accepted with 5.0, hence is also
  already in all Ubuntu release that are newer than bionic.
  
  __
  
  ---Problem Description---
  qeth on a DPM-managed IBM Z machine does not obtain its MAC Address for L2 
OSD interfaces from the OSA Network Adapter. Instead it uses a random MAC 
Address.
  
  This causes connectivity issues in setups where a reliable & pre-
  determined MAC Address is required - ie. when doing network
  configuration via DHCP.
  
  ---uname output---
  Ubuntu 18.04 / vmlinuz-4.15.0-101-generic
  
  Machine Type = IBM z14 GA2
  
  ---Debugger---
  A debugger is not configured
  
  ---Steps to Reproduce---
   - Bring up a qeth L2 OSD interface in DPM-managed LPAR.
  - Inspect the interface's MAC Address. It should be the same as displayed in 
the DPM Panels.
  
  Stack trace output:
   no
  
  Oops output:
   no
  
  System Dump Info:
    The system is not configured to capture a system dump.
  
  -Attach sysctl -a output output to the bug.
  
  Backport of "s390/qeth: improve fallback to random MAC address"
  
  Backport of "s390/qeth: utilize virtual MAC for Layer2 OSD devices"
  
  This ticket is for 18.04 only. Already available with 20.04

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1880834

Title:
  qeth: utilize virtual MAC for Layer2 OSD devices

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1880834/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads

2024-07-19 Thread Frank Heimes
Thanks Barbara for the verification!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071471

Title:
  [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive
  throughput degradation for PCI-related network workloads

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070358] Re: [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel OOPS crash

2024-07-19 Thread Frank Heimes
** Changed in: ubuntu-power-systems
   Status: In Progress => Fix Committed

** Description changed:

  SRU Justification:
-  
+ 
  [Impact]
-  * When the sosreport command is executed, a kernel OOPS happens and the 
system is crashing,
-   depending on the configuration (but default) the system/LPAR is rebooting.
-  
+  * When the sosreport command is executed, a kernel OOPS happens and the 
system is crashing,
+   depending on the configuration (but default) the system/LPAR is rebooting.
+ 
  [Fix]
-  * e0011bca603c101f2a3c007bdb77f7006fa78fb1 e0011bca603c "nfsd: initialise 
nfsd_info.mutex early"
-  
+  * e0011bca603c101f2a3c007bdb77f7006fa78fb1 e0011bca603c "nfsd: initialise 
nfsd_info.mutex early"
+ 
  [Test Case]
-  * Have a Ubuntu Server 24.04 LTS installation on ppc64el.
-  * one option is only running sosreport on the system - and
-  the crash is seen when the sosreport is starting to capture dump
-  * second option (without sosreport) is:
-  * CONFIG_NFSD=m (or y) must be set
-  * mount nfsd if not already, using "$ mount -t nfsd nfsd /proc/fs/nfsd" 
command
-  * The kernel oops will happen and the logs will show:
-...
-BUG: Kernel NULL pointer dereference on read at 0x
-Faulting instruction address: 0xc16ff114
-Oops: Kernel access of bad area, sig: 11 [#1]
-...
-  * On a system with that kernel that incl. the above patch
-no oops will occur and the sosreport command will execute normally.
-  
+  * Have a Ubuntu Server 24.04 LTS installation on ppc64el.
+  * one option is only running sosreport on the system - and
+  the crash is seen when the sosreport is starting to capture dump
+  * second option (without sosreport) is:
+  * CONFIG_NFSD=m (or y) must be set
+  * mount nfsd if not already, using "$ mount -t nfsd nfsd /proc/fs/nfsd" 
command
+  * The kernel oops will happen and the logs will show:
+    ...
+    BUG: Kernel NULL pointer dereference on read at 0x
+    Faulting instruction address: 0xc16ff114
+    Oops: Kernel access of bad area, sig: 11 [#1]
+    ...
+  * On a system with that kernel that incl. the above patch
+    no oops will occur and the sosreport command will execute normally.
+ 
  [Regression Potential]
  * There is a certain risk of a regression, with any code modification,
-   and here because the mutex handling in nfsd is modified.
-  
+   and here because the mutex handling in nfsd is modified.
+ 
  * But the changes are pretty traceable.
-  
+ 
  * On top the commit is already upstream reviewed and accepted.
-  
- * The modifications were done by the NFSD maintainer and also tested by IBM.
-  
+ 
+ * The modifications were done by the NFSD maintainer and also tested by
+ IBM.
+ 
  [Other]
  * The fix/commit got upstream accepted with kernel v6.10-rc7,
-   hence Oracular is not affected.
- 
+   hence Oracular (with a planned kernel of >=6.10) is not affected.
  
  == Comment: #0 - Tasmiya Nalatwad  - 2024-05-28 
04:35:50 ==
  --- Description ---
  When sosreport command is executed the kernel OOPS crash is happening and 
lpar is rebooting. As kdump was enabled the dump is captured.
  
  Note : The bug looks similar Bug 206504 Which is seen on z lpars.
  
  --- Lpar Details ---
  1. PowerVM
  2. FW: FW1060.00 (NH1060_026)
  3. OS: Ubuntu 24.04
  4. Kernel: 6.8.0-31-generic
  5. Mem (free -mh): 47Gi
  6. cpus: 40
  
  --- Steps to reproduce ---
  1. run sosreport command on the lpar and the crash is seen when the sosreport 
is starting to capture dump.
  
  --- Traces ---
  root@ubuntulp2host:~# sosreport
  Please note the 'sosreport' command has been deprecated in favor of the new 
'sos' command, E.G. 'sos report'.
  Redirecting to 'sos report '
  
  sosreport (version 4.5.6)
  
  This command will collect system configuration and diagnostic
  information from this Ubuntu system.
  
  For more information on Canonical visit:
  
  Community Website  : https://www.ubuntu.com/
  Commercial Support : https://www.canonical.com
  
  The generated archive may contain data considered sensitive and its
  content should be reviewed by the originating organization before being
  passed to any third party.
  
  No changes will be made to system configuration.
  
  Press ENTER to continue, or CTRL-C to quit.
  
  Optionally, please enter the case id that you are generating this report
  for []:
  
   Setting up archive ...
   Setting up plugins ...
  [plugin:lxd] skipped command 'lxc image list': required kmods missing: 
ip6table_nat, ip6table_raw, bpfilter, iptable_mangle, iptable_filter, 
iptable_raw, ebtable_filter, ip6table_mangle, ebtables, iptable_nat, 
ip6_tables, ip6table_filter.
  [plugin:lxd] skipped command 'lxc list': required kmods missing: 
ip6table_nat, ip6table_raw, bpfilter, iptable_mangle, iptable_filter, 
iptable_raw, ebtable_filter, ip6table_mangle, ebtables, iptable_nat, 
ip6_tables, ip6table_filter.
  [plugin:lxd] skipped command 'lxc network list': required kmods missing: 
ip6table_nat, 

[Bug 2073554] Re: Grub2 Support for KVM on PowerVM

2024-07-19 Thread Frank Heimes
Hi Mate, this is for Power10 systems.
For P10 systems, IBM's commercial hypervisor PowerVM was mandatory.
Just recently nested KVM on P10 was introduced (so KVM on top of PowerVM).
And this patch adds Radix support (and more) - without Radix any PowerVM KVM 
LPARs will fail to boot with grub.
(That's my understanding, also from the referenced mail thread.)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073554

Title:
  Grub2 Support for KVM on PowerVM

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2073554/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2073554] Re: Grub2 Support for KVM on PowerVM

2024-07-19 Thread Frank Heimes
** Also affects: ubuntu-power-systems
   Importance: Undecided
   Status: New

** Changed in: ubuntu-power-systems
 Assignee: (unassigned) => Ubuntu on IBM Power Systems Bug Triage 
(ubuntu-power-triage)

** Changed in: grub2 (Ubuntu)
 Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage) => 
(unassigned)

** Changed in: ubuntu-power-systems
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073554

Title:
  Grub2 Support for KVM on PowerVM

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2073554/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071774] Re: zfs-dkms FTBFS on Linux 6.10/s390x

2024-07-17 Thread Frank Heimes
** Changed in: ubuntu-z-systems
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071774

Title:
  zfs-dkms FTBFS on Linux 6.10/s390x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071774/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071774] Re: zfs-dkms FTBFS on Linux 6.10/s390x

2024-07-17 Thread Frank Heimes
** Changed in: ubuntu-z-systems
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071774

Title:
  zfs-dkms FTBFS on Linux 6.10/s390x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071774/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072366] Re: s390-tools zipl breaks when user provides target attributes

2024-07-17 Thread Frank Heimes
Hello Utkarsh, many thanks for having sponsored this upload, it's highly 
appreciated!
And I'm sorry that I did had the bug reference in the changelog.
That is something I have on my checklist before doing a PPA upload and creating 
a debdiff,
and I've grepped for the bug number, but the bug number is also part of the new 
quilt patch that I've added .

So I'm very happy that you could add it 'on the fly'. Thank you!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072366

Title:
  s390-tools zipl breaks when user provides target attributes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072366/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2073372] Re: [UBUNTU 20.04] s390x: z13 wcsncmp implementation segfaults if n=1

2024-07-17 Thread Frank Heimes
Hello and thanks for having reported this, actually shared this with us.

Is there a simple reproducer or test case that could be used to provoke
the segfault and with that to verify that it got fixed with the commit
included?

** Package changed: linux (Ubuntu) => glibc (Ubuntu)

** Also affects: ubuntu-z-systems
   Importance: Undecided
   Status: New

** Changed in: ubuntu-z-systems
 Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team)

** Changed in: glibc (Ubuntu)
 Assignee: Skipper Bug Screeners (skipper-screen-team) => (unassigned)

** Changed in: ubuntu-z-systems
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073372

Title:
  [UBUNTU 20.04] s390x: z13 wcsncmp implementation segfaults if n=1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2073372/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2073082] Re: Upgrade qclib to latest version v2.5.0

2024-07-15 Thread Frank Heimes
Build was successful, new package was uploaded ...

** Changed in: ubuntu-z-systems
   Status: In Progress => Fix Committed

** Changed in: qclib (Ubuntu)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073082

Title:
  Upgrade qclib to latest version v2.5.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2073082/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2073082] Re: Upgrade qclib to latest version v2.5.0

2024-07-15 Thread Frank Heimes
Test build started in this PPA:
https://launchpad.net/~fheimes/+archive/ubuntu/lp2073082

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073082

Title:
  Upgrade qclib to latest version v2.5.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2073082/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064538] Re: Revert back frame pointers for s390x (remove -fno-omit-frame-pointer but use -mbackchain)

2024-07-15 Thread Frank Heimes
** Summary changed:

- Revert back frame pointers for s390x (remove -fno-omit-framepointer but use 
-mbackchain)
+ Revert back frame pointers for s390x (remove -fno-omit-frame-pointer but use 
-mbackchain)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064538

Title:
  Revert back frame pointers for s390x (remove -fno-omit-frame-pointer
  but use -mbackchain)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2064538/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064539] Re: Revert back frame pointers for ppc64el (remove -fno-omit-frame-pointer)

2024-07-15 Thread Frank Heimes
** Summary changed:

- Revert back frame pointers for ppc64el (remove -fno-omit-framepointer)
+ Revert back frame pointers for ppc64el (remove -fno-omit-frame-pointer)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064539

Title:
  Revert back frame pointers for ppc64el (remove -fno-omit-frame-
  pointer)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2064539/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2073082] Re: Upgrade qclib to latest version v2.5.0

2024-07-15 Thread Frank Heimes
** Changed in: qclib (Ubuntu)
   Status: New => In Progress

** Changed in: ubuntu-z-systems
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073082

Title:
  Upgrade qclib to latest version v2.5.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2073082/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2073082] [NEW] Upgrade qclib to latest version v2.5.0

2024-07-15 Thread Frank Heimes
Public bug reported:

Please bump the version of the qclib package to latest v2.5.0 for
oracular.

** Affects: ubuntu-z-systems
 Importance: Medium
 Assignee: Skipper Bug Screeners (skipper-screen-team)
 Status: New

** Affects: qclib (Ubuntu)
 Importance: Medium
 Assignee: Frank Heimes (fheimes)
 Status: New


** Tags: s390x

** Also affects: qclib (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: qclib (Ubuntu)
 Assignee: (unassigned) => Frank Heimes (fheimes)

** Changed in: ubuntu-z-systems
 Assignee: Frank Heimes (fheimes) => Skipper Bug Screeners 
(skipper-screen-team)

** Changed in: ubuntu-z-systems
   Importance: Undecided => Medium

** Changed in: qclib (Ubuntu)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073082

Title:
  Upgrade qclib to latest version v2.5.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2073082/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070358] Re: [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel OOPS crash

2024-07-14 Thread Frank Heimes
Patch was submitted to kernel teams mailing list (thx Patricia):
https://lists.ubuntu.com/archives/kernel-team/2024-July/thread.html#152124

** Changed in: ubuntu-power-systems
   Status: New => In Progress

** Changed in: linux (Ubuntu)
   Status: New => In Progress

** Changed in: linux (Ubuntu)
 Assignee: Patricia Domingues (patriciasd) => Canonical Kernel Team 
(canonical-kernel-team)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070358

Title:
  [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel
  OOPS crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2070358/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070358] Re: [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel OOPS crash

2024-07-12 Thread Frank Heimes
** Changed in: linux (Ubuntu)
 Assignee: (unassigned) => Patricia Domingues (patriciasd)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070358

Title:
  [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel
  OOPS crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2070358/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072366] Re: s390-tools zipl breaks when user provides target attributes

2024-07-12 Thread Frank Heimes
Great, thx for your validation, Cody!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072366

Title:
  s390-tools zipl breaks when user provides target attributes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072366/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2044104] Re: [UBUNTU 20.04] chzdev -e is rebuilding initramfs even with zdev:early=0 set

2024-07-12 Thread Frank Heimes
I see Benjamin - thought that I had accidentally removed it by updating
the bug (since it was still there in my old browser tab), removed it
again.

(Btw. looks like comment #10 is an iisue with the bugzilla-launchpad
bridge ...)

** No longer affects: initramfs-tools (Ubuntu)

** No longer affects: initramfs-tools (Ubuntu Oracular)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2044104

Title:
  [UBUNTU 20.04] chzdev -e is rebuilding initramfs even with
  zdev:early=0 set

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2044104/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1982335] Re: [24.10 FEAT] Valgrind: Support for new IBM Z Hardware (IBM z16)

2024-07-12 Thread Frank Heimes
Many thx Andreas for the quick validation!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1982335

Title:
  [24.10 FEAT] Valgrind: Support for new IBM Z Hardware (IBM z16)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1982335/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2044104] Re: [UBUNTU 20.04] chzdev -e is rebuilding initramfs even with zdev:early=0 set

2024-07-11 Thread Frank Heimes
@vorlon yes, that's correct. (This bug became a bit abandoned ...)
I just changed the target release to oracular and set s390-tools to Fix 
Released.

** Also affects: s390-tools (Ubuntu Oracular)
   Importance: Medium
 Assignee: Skipper Bug Screeners (skipper-screen-team)
   Status: New

** Also affects: systemd (Ubuntu Oracular)
   Importance: Medium
 Assignee: Simon Chopin (schopin)
   Status: New

** Changed in: s390-tools (Ubuntu Oracular)
   Status: New => Fix Released

** No longer affects: s390-tools (Ubuntu Noble)

** No longer affects: systemd (Ubuntu Noble)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2044104

Title:
  [UBUNTU 20.04] chzdev -e is rebuilding initramfs even with
  zdev:early=0 set

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2044104/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2044104] Re: [UBUNTU 20.04] chzdev -e is rebuilding initramfs even with zdev:early=0 set

2024-07-11 Thread Frank Heimes
Where are the initramfs-tools gone? Added it again ... (sorry)

** Also affects: initramfs-tools (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2044104

Title:
  [UBUNTU 20.04] chzdev -e is rebuilding initramfs even with
  zdev:early=0 set

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2044104/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072366] Re: s390-tools zipl breaks when user provides target attributes

2024-07-11 Thread Frank Heimes
** Tags added: pe-sponsoring-request

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072366

Title:
  s390-tools zipl breaks when user provides target attributes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072366/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1982335] Re: [24.10 FEAT] Valgrind: Support for new IBM Z Hardware (IBM z16)

2024-07-11 Thread Frank Heimes
** Tags added: pe-sponsoring-request

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1982335

Title:
  [24.10 FEAT] Valgrind: Support for new IBM Z Hardware (IBM z16)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1982335/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064539] Re: Revert back frame pointers for ppc64el (remove -fno-omit-framepointer)

2024-07-11 Thread Frank Heimes
** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064539

Title:
  Revert back frame pointers for ppc64el (remove -fno-omit-framepointer)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2064539/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060217] Re: NFSv4 fails to mount in noble/s390x

2024-07-11 Thread Frank Heimes
I'm closing this ticket as Fix Released, since the Ubuntu kernel 6.8.0-38 just 
transitioned from -proposed to -updates (and -security):
 linux-generic | 6.8.0-38.38| noble-security| amd64, arm64, 
armhf, ppc64el, s390x
 linux-generic | 6.8.0-38.38| noble-proposed| amd64, arm64, 
armhf, ppc64el, s390x
 linux-generic | 6.8.0-38.38| noble-updates | amd64, arm64, 
armhf, ppc64el, s390x


** Changed in: linux (Ubuntu)
   Status: Fix Committed => Fix Released

** Changed in: ubuntu-z-systems
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060217

Title:
  NFSv4 fails to mount in noble/s390x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/2060217/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064538] Re: Revert back frame pointers for s390x (remove -fno-omit-framepointer but use -mbackchain)

2024-07-11 Thread Frank Heimes
** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064538

Title:
  Revert back frame pointers for s390x (remove -fno-omit-framepointer
  but use -mbackchain)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2064538/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1982335] Re: [24.10 FEAT] Valgrind: Support for new IBM Z Hardware (IBM z16)

2024-07-10 Thread Frank Heimes
I did a version bump to v3.23.
s390x built fine, but I had issues with armhf that I've fixed.

A test build of the new valgrind version is now available here:
https://launchpad.net/~fheimes/+archive/ubuntu/lp1982335

** Changed in: ubuntu-z-systems
   Status: Incomplete => In Progress

** Changed in: valgrind (Ubuntu)
   Status: Expired => In Progress

** Information type changed from Private to Public

** Changed in: valgrind (Ubuntu)
 Assignee: (unassigned) => Frank Heimes (fheimes)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1982335

Title:
  [24.10 FEAT] Valgrind: Support for new IBM Z Hardware (IBM z16)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1982335/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1982335] Re: [24.10 FEAT] Valgrind: Support for new IBM Z Hardware (IBM z16)

2024-07-10 Thread Frank Heimes
** Attachment added: "debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/valgrind/+bug/1982335/+attachment/5795842/+files/valgring_oracular_from_3.22.0-0ubuntu3_to_3.23.0-0ubuntu1.diff.gz

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1982335

Title:
  [24.10 FEAT] Valgrind: Support for new IBM Z Hardware (IBM z16)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1982335/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072641] Re: [UBUNTU 22.04] KVM: s390: unhandled guest LPSWEY instruction

2024-07-10 Thread Frank Heimes
Great, that it was added to stable 5.15 - thx!

(In the upstream commit I only found:
Fixes: a3efa8429266 ("KVM: s390: gen_facilities: allow facilities 165, 193, 194 
and 196")
would have also assumed to see a line starting with:
Cc:  # ...

But anyway, very happy that it comes to 5.15 via upstream !)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072641

Title:
  [UBUNTU 22.04] KVM: s390: unhandled guest LPSWEY instruction

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072641/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072641] Re: [UBUNTU 22.04] KVM: s390: unhandled guest LPSWEY instruction

2024-07-10 Thread Frank Heimes
I unfortunately don't see that 4c6abb7f7b34 "KVM: s390: fix LPSWEY
handling" got upstream marked as stable update, since in such a case it
would have been picked by the Canonical kernel team automatically.

** Also affects: ubuntu-z-systems
   Importance: Undecided
   Status: New

** Changed in: ubuntu-z-systems
 Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team)

** Changed in: linux (Ubuntu)
 Assignee: Skipper Bug Screeners (skipper-screen-team) => (unassigned)

** Changed in: ubuntu-z-systems
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072641

Title:
  [UBUNTU 22.04] KVM: s390: unhandled guest LPSWEY instruction

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072641/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072641] Re: [UBUNTU 22.04] KVM: s390: unhandled guest LPSWEY instruction

2024-07-10 Thread Frank Heimes
Would it be possible to get a test case aka reproducer on this (so
forcing the system into such a rare case)? Since we would need a kind of
a test for a potential SRU.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072641

Title:
  [UBUNTU 22.04] KVM: s390: unhandled guest LPSWEY instruction

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072641/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072540] Re: rustc: "backchain" on IBM Z platforms is considered unsafe by Rust

2024-07-09 Thread Frank Heimes
** Tags added: s390x

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072540

Title:
  rustc: "backchain" on IBM Z platforms is considered unsafe by Rust

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rust-defaults/+bug/2072540/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2062556] Re: [Ubuntu-24.04] Hugepage memory is not getting released even after destroying the guest!

2024-07-09 Thread Frank Heimes
Excuse me Kowshik Jois, you can safely ignore the last few comments from 
"Ubuntu Kernel Bot (ubuntu-kernel-bot)".
After a bug like this is already in Fix Released state, the fix was already 
published and is out and there is nothing more to do.
(The msgs are kind of spam from our kernel team's bot ...)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062556

Title:
  [Ubuntu-24.04] Hugepage memory is not getting released even after
  destroying the guest!

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2062556/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072366] Re: s390-tools zipl breaks when user provides target attributes

2024-07-08 Thread Frank Heimes
> > (But btw. why have you attached your Intel ProcCpuinfoMinimal.txt
here?)

> I used ubuntu-bug to file the bug, and it collected that
automatically. It's irrelevant, I've removed it.

I see...

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072366

Title:
  s390-tools zipl breaks when user provides target attributes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072366/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064538] Re: Revert back frame pointers for s390x (remove -fno-omit-framepointer but use -mbackchain)

2024-07-08 Thread Frank Heimes
** Tags added: reverse-proxy-bugzilla

** Changed in: ubuntu-z-systems
 Assignee: (unassigned) => bugproxy (bugproxy)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064538

Title:
  Revert back frame pointers for s390x (remove -fno-omit-framepointer
  but use -mbackchain)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2064538/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071774] Re: zfs-dkms FTBFS on Linux 6.10/s390x

2024-07-08 Thread Frank Heimes
** Changed in: ubuntu-z-systems
 Assignee: (unassigned) => bugproxy (bugproxy)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071774

Title:
  zfs-dkms FTBFS on Linux 6.10/s390x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071774/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072366] Re: s390-tools zipl breaks when user provides target attributes

2024-07-08 Thread Frank Heimes
debdiffs

** Attachment added: "lp2072366.tgz"
   
https://bugs.launchpad.net/ubuntu/+source/s390-tools/+bug/2072366/+attachment/5795389/+files/lp2072366.tgz

** Also affects: s390-tools-signed (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: s390-tools-signed (Ubuntu)
   Status: New => In Progress

** Changed in: s390-tools-signed (Ubuntu)
   Importance: Undecided => High

** Changed in: s390-tools (Ubuntu)
 Assignee: (unassigned) => Frank Heimes (fheimes)

** Changed in: s390-tools-signed (Ubuntu)
 Assignee: (unassigned) => Frank Heimes (fheimes)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072366

Title:
  s390-tools zipl breaks when user provides target attributes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072366/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072366] Re: s390-tools zipl breaks when user provides target attributes

2024-07-08 Thread Frank Heimes
** Changed in: ubuntu-z-systems
   Status: New => In Progress

** Changed in: s390-tools (Ubuntu)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072366

Title:
  s390-tools zipl breaks when user provides target attributes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072366/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072366] Re: s390-tools zipl breaks when user provides target attributes

2024-07-08 Thread Frank Heimes
Thx Cody for this report and you investigation upstream.

An update package, with the above fix included, is currently building in the 
following PPA:
launchpad.net/~fheimes/+archive/ubuntu/lp2072366

(But btw. why have you attached your Intel ProcCpuinfoMinimal.txt here?)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072366

Title:
  s390-tools zipl breaks when user provides target attributes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072366/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072366] Re: s390-tools zipl breaks when user provides target attributes

2024-07-07 Thread Frank Heimes
** Tags added: s390x

** Also affects: ubuntu-z-systems
   Importance: Undecided
   Status: New

** Changed in: ubuntu-z-systems
 Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team)

** Changed in: ubuntu-z-systems
   Importance: Undecided => High

** Changed in: s390-tools (Ubuntu)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072366

Title:
  s390-tools zipl breaks when user provides target attributes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072366/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072257] Re: s390-tools: fail to build after gcc-defaults 1.215ubuntu2

2024-07-05 Thread Frank Heimes
The debdiffs ...

** Attachment added: "debdiffs.tgz"
   
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072257/+attachment/5794862/+files/debdiffs.tgz

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072257

Title:
  s390-tools: fail to build after gcc-defaults 1.215ubuntu2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072257/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072257] Re: s390-tools: fail to build after gcc-defaults 1.215ubuntu2

2024-07-05 Thread Frank Heimes
Test builds have been completed and successfully tested (I was
especially concerned regarding zipl) - see attachment.

** Attachment added: "2072257_verification.txt"
   
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072257/+attachment/5794861/+files/2072257_verification.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072257

Title:
  s390-tools: fail to build after gcc-defaults 1.215ubuntu2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072257/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072257] Re: s390-tools: fail to build after gcc-defaults 1.215ubuntu2

2024-07-05 Thread Frank Heimes
Test builds are currently building in this PPA:
launchpad.net/~fheimes/+archive/ubuntu/lp2072257

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072257

Title:
  s390-tools: fail to build after gcc-defaults 1.215ubuntu2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072257/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072257] Re: s390-tools: fail to build after gcc-defaults 1.215ubuntu2

2024-07-05 Thread Frank Heimes
Fix is to remove gcc-multilib as dependency from d/control, because due
to the removal of 31-bit legacy support gcc-multilib is no longer needed
and also (and especially) no longer build for s390x anymore, which led
to a failed package rebuilds.

** Tags added: s390x

** Also affects: s390-tools-signed (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: ubuntu-z-systems
   Importance: Undecided
   Status: New

** Changed in: s390-tools (Ubuntu)
 Assignee: (unassigned) => Frank Heimes (fheimes)

** Changed in: s390-tools-signed (Ubuntu)
 Assignee: (unassigned) => Frank Heimes (fheimes)

** Changed in: ubuntu-z-systems
 Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team)

** Changed in: s390-tools (Ubuntu)
   Status: New => In Progress

** Changed in: s390-tools-signed (Ubuntu)
   Status: New => In Progress

** Changed in: ubuntu-z-systems
   Status: New => In Progress

** Changed in: s390-tools-signed (Ubuntu)
   Importance: Undecided => High

** Changed in: s390-tools (Ubuntu)
   Importance: Undecided => High

** Changed in: ubuntu-z-systems
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072257

Title:
  s390-tools: fail to build after gcc-defaults 1.215ubuntu2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072257/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads

2024-07-04 Thread Frank Heimes
** Changed in: ubuntu-z-systems
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071471

Title:
  [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive
  throughput degradation for PCI-related network workloads

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064530] Re: Include support for .NET 8 for Ubuntu on Power

2024-07-04 Thread Frank Heimes
Great ! - Thank you:
$ rmadison --arch=ppc64el dotnet8
 dotnet8 | 8.0.105-8.0.5-0ubuntu2 | oracular | ppc64el

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064530

Title:
  Include support for .NET 8 for Ubuntu on Power

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2064530/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071774] Re: zfs-dkms FTBFS on Linux 6.10/s390x

2024-07-03 Thread Frank Heimes
** Tags added: s390x

** Also affects: ubuntu-z-systems
   Importance: Undecided
   Status: New

** Tags added: reverse-proxy-bugzilla

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071774

Title:
  zfs-dkms FTBFS on Linux 6.10/s390x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071774/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads

2024-07-03 Thread Frank Heimes
Many thanks for confirming, Niklas!

** Description changed:

  SRU Justification:
  
  [Impact]
  
   * With the introduction of c76c067e488c "s390/pci: Use dma-iommu layer"
     (upstream with since kernel v6.7-rc1) there was a move (on s390x only)
     to a different dma-iommu implementation.
  
   * And with 92bce97f0c34 "s390/pci: Fix reset of IOMMU software counters"
     (again upstream since 6.7(rc-1) the IOMMU_DEFAULT_DMA_LAZY kernel config
     option should now be set to 'yes' by default for s390x.
  
   * Since CONFIG_IOMMU_DEFAULT_DMA_STRICT and IOMMU_DEFAULT_DMA_LAZY
     are related to each other CONFIG_IOMMU_DEFAULT_DMA_STRICT needs to be
     set to "no" by default, which was upstream done by b2b97a62f055
     "Revert "s390: update defconfigs"".
  
   * These changes are all upstream, but were not picked up by the Ubuntu
     kernel config.
  
   * And not having these config options set properly is causing significant
     PCI-related network throughput degradation (up to -72%).
  
   * This shows for almost all workloads and numbers of connections,
     deteriorating with the number of connections increasing.
  
   * Especially drastic is the drop for a high number of parallel connections
     (50 and 250) and for small and medium-size transactional workloads.
     However, also for streaming-type workloads the degradation is clearly
     visible (up to 48% degradation).
  
  [Fix]
  
   * The (upstream accepted) fix is to set
     IOMMU_DEFAULT_DMA_STRICT=no
     and
     IOMMU_DEFAULT_DMA_LAZY=y
     (which is needed for the changed DAM IOMMU implementation since v6.7).
  
  [Test Case]
  
-  * Setup two Ubuntu Server 24.04 LPARs (with kernel 6.8)
+  * Setup two Ubuntu Server 24.04 systems (with kernel 6.8)
     (one acting as server and as client)
     that have (PCIe attached) RoCE Express devices attached
     and that are connected to each other.
+ 
+  * Verify if the the iommu_group type of the used PCI device is DMA-FQ:
+cat /sys/bus/pci/devices/\:00\:00.0/iommu_group/type
+DMA-FQ
  
   * Sample workload rr1c-200x1000-250 with rr1c-200x1000-250.xml:
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
  
   * Install uperf on both systems, client and server.
  
   * Start uperf at server: uperf -s
  
   * Start uperf at client: uperf -vai 5 -m uperf-profile.xml
  
   * Switch from strict to lazy mode
     either using the new kernel (or the test build below)
     or using kernel cmd-line parameter iommu.strict=0.
  
   * Restart uperf on server and client, like before.
  
   * Verification will be performed by IBM.
  
  [Regression Potential]
  
   * The is a certain regression potential, since the behavior with
     the two modified kernel config options will change significantly.
  
   * This may solve the (network) throughput issue with PCI devices,
     but may also come with side-effects on other PCIe based devices
     (the old compression adapters or the new NVMe carrier cards).
  
  [Other]
  
   * CCW devices are not affected.
  
   * This is s390x-specific only, hence will not affect any other
  architecture.
  
  __
  
  Symptom:
  Comparing Ubuntu 24.04 (kernelversion: 6.8.0-31-generic) against Ubuntu 
22.04, all of our PCI-related network measurements on LPAR show massive 
throughput degradations (up to -72%). This shows for almost all workloads and 
numbers of connections, detereorating with the number of connections 
increasing. Especially drastic is the drop for a high number of parallel 
connections (50 and 250) and for small and medium-size transactional workloads. 
However, also for streaming-type workloads the degradation is clearly visible 
(up to 48% degradation).
  
  Problem:
  With kernel config setting CONFIG_IOMMU_DEFAULT_DMA_STRICT=y, IOMMU DMA mode 
changed from lazy to strict, causing these massive degradations.
  Behavior can also be changed with a kernel commandline parameter 
(iommu.strict) for easy verification.
  
  The issue is known and was quickly fixed upstream in December 2023, after 
being present for little less than two weeks.
  Upstream fix: 
https://github.com/torvalds/linux/commit/b2b97a62f055dd638f7f02087331a8380d8f139a
  
  Repro:
  rr1c-200x1000-250 with rr1c-200x1000-250.xml:
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  0) Install uperf on both systems, client and server.
  1) Start uperf at server: uperf -s
  2) Start uperf at client: uperf -vai 5 -m uperf-profile.xml
  
  3) Switch from strict to lazy mode using kernel commandline parameter 
iommu.strict=0.
  

[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads

2024-07-03 Thread Frank Heimes
Well, 'make defconfig' is what I cannot use, since we have the Ubuntu specific 
kernel options (and tools).
But since "not set" defaults to no, I guess it should be okay to explicitly set 
CONFIG_IOMMU_DEFAULT_DMA_STRICT=n.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071471

Title:
  [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive
  throughput degradation for PCI-related network workloads

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads

2024-07-03 Thread Frank Heimes
Modification was sent to kernel teams mailing list:
https://lists.ubuntu.com/archives/kernel-team/2024-July/thread.html#151928

** Changed in: linux (Ubuntu)
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071471

Title:
  [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive
  throughput degradation for PCI-related network workloads

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads

2024-07-03 Thread Frank Heimes
** Description changed:

  SRU Justification:
  
  [Impact]
  
-  * With the introduction of c76c067e488c "s390/pci: Use dma-iommu layer"
-(upstream with since kernel v6.7-rc1) there was a move (on s390x only)
-to a different dma-iommu implementation.
+  * With the introduction of c76c067e488c "s390/pci: Use dma-iommu layer"
+    (upstream with since kernel v6.7-rc1) there was a move (on s390x only)
+    to a different dma-iommu implementation.
  
-  * And with 92bce97f0c34 "s390/pci: Fix reset of IOMMU software counters"
-(again upstream since 6.7(rc-1) the IOMMU_DEFAULT_DMA_LAZY kernel config
-option should now be set to 'yes' by default for s390x.
+  * And with 92bce97f0c34 "s390/pci: Fix reset of IOMMU software counters"
+    (again upstream since 6.7(rc-1) the IOMMU_DEFAULT_DMA_LAZY kernel config
+    option should now be set to 'yes' by default for s390x.
  
-  * Since CONFIG_IOMMU_DEFAULT_DMA_STRICT and IOMMU_DEFAULT_DMA_LAZY
-are related to each other CONFIG_IOMMU_DEFAULT_DMA_STRICT needs to be
-set to "no" by default, which was upstream done by b2b97a62f055
-"Revert "s390: update defconfigs"".
+  * Since CONFIG_IOMMU_DEFAULT_DMA_STRICT and IOMMU_DEFAULT_DMA_LAZY
+    are related to each other CONFIG_IOMMU_DEFAULT_DMA_STRICT needs to be
+    set to "no" by default, which was upstream done by b2b97a62f055
+    "Revert "s390: update defconfigs"".
  
-  * These changes are all upstream, but were not picked up by the Ubuntu
-kernel config.
+  * These changes are all upstream, but were not picked up by the Ubuntu
+    kernel config.
  
-  * And not having these config options set properly is causing significant
-PCI-related network throughput degradation (up to -72%).
+  * And not having these config options set properly is causing significant
+    PCI-related network throughput degradation (up to -72%).
  
-  * This shows for almost all workloads and numbers of connections,
-deteriorating with the number of connections increasing.
+  * This shows for almost all workloads and numbers of connections,
+    deteriorating with the number of connections increasing.
  
-  * Especially drastic is the drop for a high number of parallel connections
-(50 and 250) and for small and medium-size transactional workloads.
-However, also for streaming-type workloads the degradation is clearly
-visible (up to 48% degradation).
+  * Especially drastic is the drop for a high number of parallel connections
+    (50 and 250) and for small and medium-size transactional workloads.
+    However, also for streaming-type workloads the degradation is clearly
+    visible (up to 48% degradation).
  
  [Fix]
  
-  * The (upstream) fix is to set
-IOMMU_DEFAULT_DMA_STRICT=no
-and
-IOMMU_DEFAULT_DMA_LAZY=y
-(which is needed for the changed DAM IOMMU implementation since v6.7).
+  * The (upstream accepted) fix is to set
+    IOMMU_DEFAULT_DMA_STRICT=no
+    and
+    IOMMU_DEFAULT_DMA_LAZY=y
+    (which is needed for the changed DAM IOMMU implementation since v6.7).
  
  [Test Case]
  
-  * Setup two Ubuntu Server 24.04 LPARs (with kernel 6.8)
-(one acting as server and as client)
-that have (PCIe attached) RoCE Express devices attached
-and that are connected to each other.
+  * Setup two Ubuntu Server 24.04 LPARs (with kernel 6.8)
+    (one acting as server and as client)
+    that have (PCIe attached) RoCE Express devices attached
+    and that are connected to each other.
  
-  * Sample workload rr1c-200x1000-250 with rr1c-200x1000-250.xml:
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
+  * Sample workload rr1c-200x1000-250 with rr1c-200x1000-250.xml:
+    
+    
+    
+    
+    
+    
+    
+    
+    
+    
+    
+    
+    
+    
+    
  
-  * Install uperf on both systems, client and server.
+  * Install uperf on both systems, client and server.
  
-  * Start uperf at server: uperf -s
+  * Start uperf at server: uperf -s
  
-  * Start uperf at client: uperf -vai 5 -m uperf-profile.xml
+  * Start uperf at client: uperf -vai 5 -m uperf-profile.xml
  
-  * Switch from strict to lazy mode 
-either using the new kernel (or the test build below)
-or using kernel cmd-line parameter iommu.strict=0.
+  * Switch from strict to lazy mode
+    either using the new kernel (or the test build below)
+    or using kernel cmd-line parameter iommu.strict=0.
  
-  * Restart uperf on server and client, like before.
+  * Restart uperf on server and client, like before.
  
-  * Verification will be performed by 

[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads

2024-07-03 Thread Frank Heimes
** Description changed:

+ SRU Justification:
+ 
+ [Impact]
+ 
+  * With the introduction of c76c067e488c "s390/pci: Use dma-iommu layer"
+(upstream with since kernel v6.7-rc1) there was a move (on s390x only)
+to a different dma-iommu implementation.
+ 
+  * And with 92bce97f0c34 "s390/pci: Fix reset of IOMMU software counters"
+(again upstream since 6.7(rc-1) the IOMMU_DEFAULT_DMA_LAZY kernel config
+option should now be set to 'yes' by default for s390x.
+ 
+  * Since CONFIG_IOMMU_DEFAULT_DMA_STRICT and IOMMU_DEFAULT_DMA_LAZY
+are related to each other CONFIG_IOMMU_DEFAULT_DMA_STRICT needs to be
+set to "no" by default, which was upstream done by b2b97a62f055
+"Revert "s390: update defconfigs"".
+ 
+  * These changes are all upstream, but were not picked up by the Ubuntu
+kernel config.
+ 
+  * And not having these config options set properly is causing significant
+PCI-related network throughput degradation (up to -72%).
+ 
+  * This shows for almost all workloads and numbers of connections,
+deteriorating with the number of connections increasing.
+ 
+  * Especially drastic is the drop for a high number of parallel connections
+(50 and 250) and for small and medium-size transactional workloads.
+However, also for streaming-type workloads the degradation is clearly
+visible (up to 48% degradation).
+ 
+ [Fix]
+ 
+  * The (upstream) fix is to set
+IOMMU_DEFAULT_DMA_STRICT=no
+and
+IOMMU_DEFAULT_DMA_LAZY=y
+(which is needed for the changed DAM IOMMU implementation since v6.7).
+ 
+ [Test Case]
+ 
+  * Setup two Ubuntu Server 24.04 LPARs (with kernel 6.8)
+(one acting as server and as client)
+that have (PCIe attached) RoCE Express devices attached
+and that are connected to each other.
+ 
+  * Sample workload rr1c-200x1000-250 with rr1c-200x1000-250.xml:
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ 
+  * Install uperf on both systems, client and server.
+ 
+  * Start uperf at server: uperf -s
+ 
+  * Start uperf at client: uperf -vai 5 -m uperf-profile.xml
+ 
+  * Switch from strict to lazy mode 
+either using the new kernel (or the test build below)
+or using kernel cmd-line parameter iommu.strict=0.
+ 
+  * Restart uperf on server and client, like before.
+ 
+  * Verification will be performed by IBM.
+ 
+ [Regression Potential]
+ 
+  * The is a certain regression potential, since the behavior with
+the two modified kernel config options will change significantly.
+ 
+  * This may solve the (network) throughput issue with PCI devices,
+but may also come with side-effects on other PCIe based devices
+(the old compression adapters or the new NVMe carrier cards).
+ 
+ [Other]
+ 
+  * CCW devices are not affected.
+ 
+  * This is s390x-specific only, hence will not affect any other
+ architecture.
+ 
+ __
+ 
  Symptom:
  Comparing Ubuntu 24.04 (kernelversion: 6.8.0-31-generic) against Ubuntu 
22.04, all of our PCI-related network measurements on LPAR show massive 
throughput degradations (up to -72%). This shows for almost all workloads and 
numbers of connections, detereorating with the number of connections 
increasing. Especially drastic is the drop for a high number of parallel 
connections (50 and 250) and for small and medium-size transactional workloads. 
However, also for streaming-type workloads the degradation is clearly visible 
(up to 48% degradation).
  
  Problem:
  With kernel config setting CONFIG_IOMMU_DEFAULT_DMA_STRICT=y, IOMMU DMA mode 
changed from lazy to strict, causing these massive degradations.
  Behavior can also be changed with a kernel commandline parameter 
(iommu.strict) for easy verification.
  
  The issue is known and was quickly fixed upstream in December 2023, after 
being present for little less than two weeks.
  Upstream fix: 
https://github.com/torvalds/linux/commit/b2b97a62f055dd638f7f02087331a8380d8f139a
  
  Repro:
  rr1c-200x1000-250 with rr1c-200x1000-250.xml:
  
  
  
- 
- 
- 
- 
- 
- 
- 
- 
- 
- 
- 
- 
+ 
+ 
+ 
+ 
+ 
+ 
+ 
+ 
+ 
+ 
+ 
+ 
  
  
  0) Install uperf on both systems, client and server.
  1) Start uperf at server: uperf -s
  2) Start uperf at client: uperf -vai 5 -m uperf-profile.xml
  
  3) Switch from strict to lazy mode using kernel commandline parameter 
iommu.strict=0.
  4) Repeat 

[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads

2024-07-03 Thread Frank Heimes
Looks like it's not sufficient to have IOMMU_DEFAULT_DMA_LAZY=y only
in addition IOMMU_DEFAULT_DMA_STRICT=n seems to be needed on top (otherwise the 
build failed for me).
(Which I think is not super great upstream, one option should be fine -- with 
the two kernel options, there are now two unspecific cases: both n and both y - 
anyway ...)

I did a test build in PPA here:
https://launchpad.net/~fheimes/+archive/ubuntu/lp2071471
would be great if this can be tried.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071471

Title:
  [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive
  throughput degradation for PCI-related network workloads

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068577] Re: [UBUNTU 24.04] Running sosreport causes the system to crash and produce a dump

2024-07-02 Thread Frank Heimes
So the NFS problem that was reported in LP#2060217 is already addressed and is 
fixed in the Ubuntu Kernel 6.8.0-38.
But kernel 6.8.0-38 is not yet fully rolled out - it's currently in the 
"-proposed" pocket of the Ubuntu archive, but can already be tested and used.

However, the way to install from "-proposed" changed starting with
24.04, this is the 'new way':

$ sudo add-apt-repository -y "deb http://ports.ubuntu.com/ubuntu-ports/ 
$(lsb_release -sc)-proposed main universe"
$ sudo apt update
$ apt-cache policy linux-generic
linux-generic:
  Installed: 6.8.0-36.36
  Candidate: 6.8.0-36.36
  Version table:
 6.8.0-38.38 100
100 http://ports.ubuntu.com/ubuntu-ports noble-proposed/main s390x 
Packages
 *** 6.8.0-36.36 500
500 http://ports.ubuntu.com/ubuntu-ports noble-updates/main s390x 
Packages
500 http://ports.ubuntu.com/ubuntu-ports noble-security/main s390x 
Packages
100 /var/lib/dpkg/status
 6.8.0-31.31 500
500 http://ports.ubuntu.com/ubuntu-ports noble/main s390x Packages
$ sudo apt -t=noble-proposed install linux-generic   # will install 6.8.0-38 
from noble-proposed

Testing this kernel (with nfs enabled) would show if the fix for nfs in
LP#2060217 is also fixing the situation here.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068577

Title:
  [UBUNTU 24.04] Running sosreport causes the system to crash and
  produce a dump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2068577/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads

2024-07-01 Thread Frank Heimes
Hi Niklas, thanks for the backgrounds.

So to sum it up:

The Ubuntu kernel config options for IOMMU_DEFAULT_DMA_LAZY and
IOMMU_DEFAULT_DMA_STRICT haven't changed since jammy/22.04:

5.15.0-1.1 to 5.15.0-115.125
CONFIG_IOMMU_DEFAULT_DMA_STRICT=y
# CONFIG_IOMMU_DEFAULT_DMA_LAZY is not set

6.8.0-6.6 to 6.8.0-38.38
CONFIG_IOMMU_DEFAULT_DMA_STRICT=y
# CONFIG_IOMMU_DEFAULT_DMA_LAZY is not set

But with the introduction of 
c76c067e488c s390/pci: Use dma-iommu layer
which moves to a different dma-iommu implementation and 
92bce97f0c34 s390/pci: Fix reset of IOMMU software counters
(both available since 6.7(rc-1)
the IOMMU_DEFAULT_DMA_LAZY kernel config option should be set to 'yes' by 
default for s390x.

Does CONFIG_IOMMU_DEFAULT_DMA_STRICT need to be set to No on top? I
don't think so - if lazy is 'yes'.

So I believe we can go with 'IOMMU_DEFAULT_DMA_LAZY=y' for s390x only
and should be good again.

I assume that such situations happen not very often,
so it would be ideal if IBM could give us a quick heads-up in such cases (where 
a kernel config default value for s390x is changed upstream), so that we can 
double check and potentially take over changes into the Ubuntu config by hand.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071471

Title:
  [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive
  throughput degradation for PCI-related network workloads

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070358] Re: [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel OOPS crash

2024-07-01 Thread Frank Heimes
Hello Tasmiya, many thanks that you retried with latest kernel -36.

So we'll focus then on incl. commit
8e948c365d9c nfsd: fix oops when reading pool_stats before server is started

I just noticed that it's now upstream with v6.10-rc5.

** Changed in: sosreport (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070358

Title:
  [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel
  OOPS crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2070358/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads

2024-06-28 Thread Frank Heimes


-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071471

Title:
  [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive
  throughput degradation for PCI-related network workloads

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads

2024-06-28 Thread Frank Heimes
Btw. I just checked the jammy kernel config options and jammy/22.04 had and 
still has strict=yes:
$ lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description:Ubuntu 22.04.4 LTS
Release:22.04
Codename:   jammy
$ uname -a
Linux maasrrc1 5.15.0-112-generic #122-Ubuntu SMP Thu May 23 08:10:47 UTC 2024 
s390x s390x s390x GNU/Linux
ubuntu@maasrrc1:~$ grep CONFIG_IOMMU_DEFAULT_DMA_STRICT 
/boot/config-5.15.0-112-generic 
CONFIG_IOMMU_DEFAULT_DMA_STRICT=y
$ grep CONFIG_IOMMU_DEFAULT_DMA_STRICT /boot/config-5.15.0-112-generic
I also checked older jammy kernels and strict was always yes.

So this has obviously never changed from jammy to noble!

Have you modified/tweaked the setting manually on your side before
testing on jammy?!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071471

Title:
  [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive
  throughput degradation for PCI-related network workloads

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads

2024-06-28 Thread Frank Heimes
I just had a look at the Ubuntu kernel  noble master-next tree and can find 
commit:
"Revert "s390: update defconfigs"" under the hash b2b97a62f055
and I can see that it got reverted with that:
$ git show b2b97a62f055 | grep CONFIG_IOMMU_DEFAULT_DMA_STRICT
CONFIG_IOMMU_DEFAULT_DMA_STRICT option needs to be disabled.
-CONFIG_IOMMU_DEFAULT_DMA_STRICT=y
-CONFIG_IOMMU_DEFAULT_DMA_STRICT=y

But git also tells me that it is in since kernel v6.8 and with that since the 
first ubuntu 6.8 kernel we had: Ubuntu-6.8.0-6 -- so should also be in 
Ubuntu-6.8.0-31.
But it does not seem to be reflected in the kernel options of the Ubuntu kernel:
$ lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description:Ubuntu 24.04 LTS
Release:24.04
Codename:   noble
$ uname -a
Linux hwe0008 6.8.0-31-generic #31-Ubuntu SMP Sat Apr 20 00:14:26 UTC 2024 
s390x s390x s390x GNU/Linux
$ grep CONFIG_IOMMU_DEFAULT_DMA_STRICT /boot/config-6.8.0-31-generic
CONFIG_IOMMU_DEFAULT_DMA_STRICT=y
also not in the current, updated kernel:
Linux hwe0008 6.8.0-36-generic #36-Ubuntu SMP Mon Jun 10 09:59:13 UTC 2024 
s390x s390x s390x GNU/Linux
$ grep CONFIG_IOMMU_DEFAULT_DMA_STRICT /boot/config-6.8.0-31-generic
CONFIG_IOMMU_DEFAULT_DMA_STRICT=y
For some reason the change in the upstream commit was not taken over into the 
Ubuntu kernel configs ...



** Changed in: ubuntu-z-systems
 Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team)

** Changed in: linux (Ubuntu)
 Assignee: Skipper Bug Screeners (skipper-screen-team) => (unassigned)

** Changed in: ubuntu-z-systems
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071471

Title:
  [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive
  throughput degradation for PCI-related network workloads

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads

2024-06-28 Thread Frank Heimes
** Also affects: ubuntu-z-systems
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071471

Title:
  [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive
  throughput degradation for PCI-related network workloads

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067355] Re: Update s390-tools to (currently latest) v2.33.1 in oracular

2024-06-26 Thread Frank Heimes
Uploading the debdiff of the s390-tools-signed package with a fix for a
typo in the changelog.

** Patch added: 
"debdiff_s390-tools-signed_from_2.31.0-0ubuntu5_to_2.33.1-0ubuntu1.diff"
   
https://bugs.launchpad.net/ubuntu/+source/s390-tools/+bug/2067355/+attachment/5792615/+files/debdiff_s390-tools-signed_from_2.31.0-0ubuntu5_to_2.33.1-0ubuntu1.diff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067355

Title:
  Update s390-tools to (currently latest) v2.33.1 in oracular

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2067355/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070329] Re: KOP L2 guest fails to boot with 1 core - SMT8 topology

2024-06-25 Thread Frank Heimes
Looks like the names changed slightly, thanks for pointing the the right
upstream commits!

And I see that they are marked as stable updates ("Cc: sta...@vger.kernel.org # 
v6.7+"), which is great!
With that they will be soon automatically be picked up by the Canonical kernel 
team.

** Changed in: ubuntu-power-systems
   Status: New => Confirmed

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070329

Title:
  KOP L2 guest fails to boot with 1 core - SMT8 topology

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2070329/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067383] Re: [Ubuntu 24.04] hotplug of 68 or more cpus is making the guest shutoff!

2024-06-25 Thread Frank Heimes
-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067383

Title:
  [Ubuntu 24.04] hotplug of 68 or more cpus is making the guest shutoff!

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2067383/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070253] Re: KVM on PowerVM: L2 Guest-Aggressively entering CEDE results in low performance. Possible tuning opportunity.

2024-06-25 Thread Frank Heimes
Hello and thanks for having reported this issue.

I was able to find patch "KVM: PPC: Book3S HV nestedv2: Cancel pending
DEC exception" accepted in the 'linux-next' tree
(7be6ce7043b4cf293c8826a48fd9f56931cef2cf).

Do you know if it got also upstream marked for stable updates, and with that 
will be added to mainline 6.8 as well?
I'm asking because, if so, the Canonical kernel team will pick it automatically 
- but if not, it needs to be manually submitted to the Ubuntu kernel teams 
mailing list (where we can help with).

** Also affects: ubuntu-power-systems
   Importance: Undecided
   Status: New

** Changed in: ubuntu-power-systems
 Assignee: (unassigned) => Ubuntu on IBM Power Systems Bug Triage 
(ubuntu-power-triage)

** Changed in: linux (Ubuntu)
 Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage) => 
(unassigned)

** Changed in: linux (Ubuntu)
   Importance: Undecided => High

** Changed in: ubuntu-power-systems
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070253

Title:
  KVM on PowerVM: L2 Guest-Aggressively entering CEDE results in low
  performance. Possible tuning opportunity.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2070253/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070329] Re: KOP L2 guest fails to boot with 1 core - SMT8 topology (Fedora)

2024-06-25 Thread Frank Heimes
Hello and thanks for having reported this issue.

Once the patch set 'Fix doorbell emulation for v2 API on PPC' with patches:
- arch/powerpc/kvm: Add DPDES support in helper library for Guest state buffer
- arch/powerpc/kvm: Fix doorbell emulation for v2 API
are upstream accepted (having them in 'linux-next' is sufficient), we can think 
about picking them.
I cannot find them in 'linux-next' yet 
(https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/log/?qt=grep=Fix+doorbell+emulation+for+v2+API),
 but assume they are still part of a staging tree and will hit linux-next soon.

Based on your statement "The fix has been accepted upstream and will be 
backported for kernels >= 6.7" I assume the patch(es) are (or will be soon) 
also upstream marked as "stable updates", and will then land in kernel 6.8 
(that we have in 24.04).
As soon as this happens, the "stable updates" for 6.8 will be picked by the 
Canonical kernel team automatically.

** Also affects: ubuntu-power-systems
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu)
 Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage) => 
(unassigned)

** Changed in: ubuntu-power-systems
 Assignee: (unassigned) => Ubuntu on IBM Power Systems Bug Triage 
(ubuntu-power-triage)

** Summary changed:

- KOP L2 guest fails to boot with 1 core - SMT8 topology (Fedora)
+ KOP L2 guest fails to boot with 1 core - SMT8 topology

** Changed in: ubuntu-power-systems
   Importance: Undecided => High

** Changed in: linux (Ubuntu)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070329

Title:
  KOP L2 guest fails to boot with 1 core - SMT8 topology

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2070329/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070358] Re: [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel OOPS crash

2024-06-25 Thread Frank Heimes
** Changed in: ubuntu-power-systems
   Importance: Undecided => High

** Changed in: linux (Ubuntu)
   Importance: Undecided => High

** Changed in: sosreport (Ubuntu)
   Importance: Undecided => High

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070358

Title:
  [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel
  OOPS crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/2070358/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

  1   2   3   4   5   6   7   8   9   10   >