[Bug 2073786] Re: [24.10 FEAT] [LDP2018] Upgrade s390-tools to latest version (v2.34.0)
debdiffs for s390-tools and s390-tools-signed ** Attachment added: "debdiffs.tgz" https://bugs.launchpad.net/ubuntu/+source/s390-tools/+bug/2073786/+attachment/5802000/+files/debdiffs.tgz ** Changed in: ubuntu-z-systems Status: Triaged => In Progress ** Changed in: s390-tools (Ubuntu Oracular) Status: Triaged => In Progress ** Changed in: s390-tools-signed (Ubuntu Oracular) Status: Triaged => In Progress ** Information type changed from Private to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073786 Title: [24.10 FEAT] [LDP2018] Upgrade s390-tools to latest version (v2.34.0) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2073786/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2074380] Re: [UBUNTU 22.04] s390/cpum_cf: make crypto counters upward compatible
Test builds were done here: https://launchpad.net/~fheimes/+archive/ubuntu/lp2074380 Submissions to the kernel teams mailing list was done: https://lists.ubuntu.com/archives/kernel-team/2024-August/thread.html#152551 ** Changed in: linux (Ubuntu Jammy) Assignee: Frank Heimes (fheimes) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: linux (Ubuntu Noble) Assignee: Frank Heimes (fheimes) => Canonical Kernel Team (canonical-kernel-team) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2074380 Title: [UBUNTU 22.04] s390/cpum_cf: make crypto counters upward compatible To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2074380/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2074380] Re: [UBUNTU 22.04] kernel: s390/cpum_cf: make crypto counters upward compatible
** Description changed: SRU Justification: [ Impact ] - * The CPU Measurement Facility (CPU MF) crypto counter set -is not listed in the device sysfs tree - it's not exported -in the sysfs directory /sys/devices/cpum_cf/events. + * The CPU Measurement Facility (CPU MF) crypto counter set + is not listed in the device sysfs tree - it's not exported + in the sysfs directory /sys/devices/cpum_cf/events. - * The attribute files for each CPU-MF counter defined -in the crypto counter set is missing. + * The attribute files for each CPU-MF counter defined + in the crypto counter set is missing. - * This is caused by the counter second version number of CPU MF -hardware being incremented on new machines. + * This is caused by the counter second version number of CPU MF + hardware being incremented on new machines. - * This causes a sanity check to fail, -but the counters are supported by hardware. + * This causes a sanity check to fail, + but the counters are supported by hardware. - * The solution is to remove the upper limit in counter second -version number check. + * The solution is to remove the upper limit in counter second + version number check. [ Fix ] - * f10933cbd2df f10933cbd2dfddf6273698a45f76db9bafd8150f "s390/cpum_cf: - make crypto counters upward compatible across machine types" + * f10933cbd2df f10933cbd2dfddf6273698a45f76db9bafd8150f +"s390/cpum_cf: make crypto counters upward compatible across machine types" - * The fix was upstream accepted with kernel v6.10(-rc1). + * The fix was upstream accepted with kernel v6.10(-rc1). + + * Upstream commit applies cleanly on noble master-next, +but needed to be backported to jammy master-next due to different code +and context in kernel 5.15. [ Test Plan ] - * Run the following commands on a new machine generation: -(hence only doable by IBM) -# ls -l /sys/devices/cpum_cf/events/ | grep AES - - * If the output is empty than this patch is required. + * Run the following commands on a new machine generation: + (hence only doable by IBM) + # ls -l /sys/devices/cpum_cf/events/ | grep AES - * With a patched kernel the output should be like: -# ls /sys/devices/cpum_cf/events/ | grep AES -AES_BLOCKED_CYCLES -AES_BLOCKED_FUNCTIONS -AES_CYCLES -AES_FUNCTIONS + * If the output is empty than this patch is required. + + * With a patched kernel the output should be like: + # ls /sys/devices/cpum_cf/events/ | grep AES + AES_BLOCKED_CYCLES + AES_BLOCKED_FUNCTIONS + AES_CYCLES + AES_FUNCTIONS [ Where problems could occur ] - * This affects s390x only - CPU MF is s390-specific, -and only s390 specific code is modified. + * This affects s390x only - CPU MF is s390-specific, + and only s390 specific code is modified. - * And it furthermore is limited to the crypto counter set -of CPU MF. + * And it furthermore is limited to the crypto counter set + of CPU MF. - * So any impact is likely limited to hardware crypto counters -on s390x only. + * So any impact is likely limited to hardware crypto counters + on s390x only. - * In s390/kernel/perf_cpum_cf.c the else if case got changed from -explicitly checking for 6 or 7 to >= 6 which seems to require -attention for future 8 and more cases. + * In s390/kernel/perf_cpum_cf.c the else if case got changed from + explicitly checking for 6 or 7 to >= 6 which seems to require + attention for future 8 and more cases. - * In s390/kernel/perf_cpum_cf_events.c the switch (ci.csvn) statement -was changed to an if / else if with similar logic. -Again attentioin for any potential future cases >= 8. + * In s390/kernel/perf_cpum_cf_events.c the switch (ci.csvn) statement + was changed to an if / else if with similar logic. + Again attentioin for any potential future cases >= 8. - * It does not look like currently used cases (1..5 and 6..7) -are affected by the modification, just >7. + * It does not look like currently used cases (1..5 and 6..7) + are affected by the modification, just >7. - * Test build of patched jammy and noble s390x kernels were build -and are avaiable here: -https://launchpad.net/~fheimes/+archive/ubuntu/lp2074380 + * Test build of patched jammy and noble s390x kernels were build + and are avaiable here: + https://launchpad.net/~fheimes/+archive/ubuntu/lp2074380 [ Other Info ] - - * Since the code/fix was upstream accepted with kernel v6.10(-rc1) -it does not affect the current development release oracular. - * This SRU can also be seen under the umbrella of new - hardware enablement. + * Since the code/fix was upstream accepted with kernel v6.10(-rc1) + it does not affect the current development release oracular. - * Since it requires special hw, the verification needs to be -done by IBM. + * This SRU can also
[Bug 2074380] Re: [UBUNTU 22.04] kernel: s390/cpum_cf: make crypto counters upward compatible
s/cpum_cf/events/ | grep AES + AES_BLOCKED_CYCLES + AES_BLOCKED_FUNCTIONS + AES_CYCLES + AES_FUNCTIONS + # Upstream-ID of fix: f10933cbd2dfddf6273698a45f76db9bafd8150f ** Changed in: linux (Ubuntu Jammy) Assignee: (unassigned) => Frank Heimes (fheimes) ** Changed in: linux (Ubuntu Noble) Assignee: (unassigned) => Frank Heimes (fheimes) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2074380 Title: [UBUNTU 22.04] kernel: s390/cpum_cf: make crypto counters upward compatible To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2074380/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2074380] Re: [UBUNTU 22.04] kernel: s390/cpum_cf: make crypto counters upward compatible
Hello Thomas, thank you! Was also my impression that a backport is probably best. And the backport applies cleanly on jammy master-next (so yes, that is what we have to use for the next and upcoming kernel of an Ubuntu release). Proceeding now with the kernel SRU ... -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2074380 Title: [UBUNTU 22.04] kernel: s390/cpum_cf: make crypto counters upward compatible To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2074380/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2073372] Re: [UBUNTU 20.04] s390x: z13 wcsncmp implementation segfaults if n=1
** Also affects: glibc (Ubuntu Noble) Importance: Undecided Status: New ** Also affects: glibc (Ubuntu Oracular) Importance: Undecided Status: New ** Also affects: glibc (Ubuntu Jammy) Importance: Undecided Status: New ** Also affects: glibc (Ubuntu Focal) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073372 Title: [UBUNTU 20.04] s390x: z13 wcsncmp implementation segfaults if n=1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2073372/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2075491] Re: binary16 float-point arithmetic crashes LLVM on s390x
** Also affects: ubuntu-z-systems Importance: Undecided Status: New ** Tags added: reverse-proxy-bugzilla s390x ** Changed in: ubuntu-z-systems Assignee: (unassigned) => bugproxy (bugproxy) ** Changed in: llvm-toolchain-18 (Ubuntu) Importance: Undecided => Medium ** Changed in: ubuntu-z-systems Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2075491 Title: binary16 float-point arithmetic crashes LLVM on s390x To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2075491/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2027925] Re: [25.04 FEAT] [VS2218] KVM: Implement virsh hypervisor-cpu-models (libvirt)
** Summary changed: - [24.10 FEAT] [VS2218] KVM: Implement virsh hypervisor-cpu-models (libvirt) + [25.04 FEAT] [VS2218] KVM: Implement virsh hypervisor-cpu-models (libvirt) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2027925 Title: [25.04 FEAT] [VS2218] KVM: Implement virsh hypervisor-cpu-models (libvirt) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2027925/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2049701] Re: [25.04 FEAT] [VS2009] KVM: Secure IPL Simulation - libvirt part
** Summary changed: - [24.10 FEAT] [VS2009] KVM: Secure IPL Simulation - libvirt part + [25.04 FEAT] [VS2009] KVM: Secure IPL Simulation - libvirt part -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2049701 Title: [25.04 FEAT] [VS2009] KVM: Secure IPL Simulation - libvirt part To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2049701/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2049698] Re: [25.04 FEAT] [VS1807] KVM: Full boot order support (qemu)
** Summary changed: - [24.10 FEAT] [VS1807] KVM: Full boot order support (qemu) + [25.04 FEAT] [VS1807] KVM: Full boot order support (qemu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2049698 Title: [25.04 FEAT] [VS1807] KVM: Full boot order support (qemu) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2049698/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2049702] Re: [25.04 FEAT] [VS2009] KVM: Secure IPL Simulation - qemu part
** Summary changed: - [24.10 FEAT] [VS2009] KVM: Secure IPL Simulation - qemu part + [25.04 FEAT] [VS2009] KVM: Secure IPL Simulation - qemu part -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2049702 Title: [25.04 FEAT] [VS2009] KVM: Secure IPL Simulation - qemu part To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2049702/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2074380] Re: [UBUNTU 22.04] kernel: s390/cpum_cf: make crypto counters upward compatible
The commit applies fine to the noble master-next tree (kernel 6.8), and a test build was triggered here: https://launchpad.net/~fheimes/+archive/ubuntu/lp2074380 However, the cpumf code in jammy master-next (kernel 5.15) is quite different. git blame tells me that probably the following commits are needed as well: 111783-1a33aee1dc24 s390/cpum_cf: remove function validate_ctr_auth() by inline code 111784-9ae9b868aeaa s390/cpum_cf: provide counter number to validate_ctr_version() 111785:46c4d945ea1f s390/cpum_cf: introduce static CPU counter facility information but they (first of all 46c4d945ea1f) also do not apply cleanly. Would you please let us know a minimal set of patches (based on your insights of the code) that let us apply f10933cbd2df to the jammy master-next tree (git clone git://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/jammy --branch master-next --single-branch) or alternatively a backport of f10933cbd2df to this tree? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2074380 Title: [UBUNTU 22.04] kernel: s390/cpum_cf: make crypto counters upward compatible To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2074380/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2075204] Re: gdb on s390x chokes on divide-by-zero from chaos-marmosets
** Tags added: reverse-proxy-bugzilla s390x ** Also affects: ubuntu-z-systems Importance: Undecided Status: New ** Changed in: ubuntu-z-systems Assignee: (unassigned) => bugproxy (bugproxy) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2075204 Title: gdb on s390x chokes on divide-by-zero from chaos-marmosets To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2075204/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2064319] Re: Power guest secure boot with key management: GRUB2 portion
Thanks to Mate there is now an initial draft version of grub2 available in this PPA: https://launchpad.net/~mkukri/+archive/ubuntu/power-grub/+packages (https://code.launchpad.net/~ubuntu-uefi-team/grub/+git/ubuntu/+ref/power-sb) that has the patch set merged (and some issues fixed with the patch set) -- but it's untested yet. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2064319 Title: Power guest secure boot with key management: GRUB2 portion To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/2064319/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2064319] Re: Power guest secure boot with key management: GRUB2 portion
** Changed in: ubuntu-power-systems Assignee: (unassigned) => Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage) ** Changed in: grub2 (Ubuntu) Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage) => (unassigned) ** Changed in: ubuntu-power-systems Importance: Undecided => Critical ** Changed in: grub2 (Ubuntu) Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2064319 Title: Power guest secure boot with key management: GRUB2 portion To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/2064319/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2074380] Re: [UBUNTU 22.04] kernel: s390/cpum_cf: make crypto counters upward compatible
** Also affects: linux (Ubuntu Jammy) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Noble) Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Status: New => Fix Released ** Also affects: ubuntu-z-systems Importance: Undecided Status: New ** Changed in: ubuntu-z-systems Importance: Undecided => High ** Changed in: linux (Ubuntu Jammy) Importance: Undecided => High ** Changed in: linux (Ubuntu Noble) Importance: Undecided => High ** Changed in: ubuntu-z-systems Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team) ** Changed in: linux (Ubuntu) Assignee: Skipper Bug Screeners (skipper-screen-team) => (unassigned) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2074380 Title: [UBUNTU 22.04] kernel: s390/cpum_cf: make crypto counters upward compatible To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2074380/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959972] Re: [22.10 FEAT] KVM: Tool to process encrypted Secure Execution guest dumps (s390-tools)
To get this as SRU into jammy/22.04, we would need a list of commits (maybe backports) that fit to s390-tools 2.20.0-0ubuntu3.3, that we currently have in jammy. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959972 Title: [22.10 FEAT] KVM: Tool to process encrypted Secure Execution guest dumps (s390-tools) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959972/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959966] Re: [23.04 FEAT] KVM: Secure Execution guest dump encryption with customer keys - qemu part
To get this as SRU into jammy/22.04, we would need a list of commits (maybe backports) that fit to qemu 6.2 that we have in jammy. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959966 Title: [23.04 FEAT] KVM: Secure Execution guest dump encryption with customer keys - qemu part To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959966/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959940] Re: [22.10 FEAT] KVM: Secure Execution guest dump encryption with customer keys - kernel part
To get this as SRU into 22.04/jammy, backports of the above commits are needed that fit to: git clone git://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/jammy --branch master-next --single-branch -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959940 Title: [22.10 FEAT] KVM: Secure Execution guest dump encryption with customer keys - kernel part To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959940/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1856682] Re: [UBUNTU 20.04] GCC Miscompilation in vectorized code
Changing bionic entries to Won't Fix, since the base support ended. ** Changed in: gcc-5 (Ubuntu Bionic) Status: New => Won't Fix ** Changed in: gcc-6 (Ubuntu Bionic) Status: New => Won't Fix ** Changed in: gcc-7 (Ubuntu Bionic) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1856682 Title: [UBUNTU 20.04] GCC Miscompilation in vectorized code To manage notifications about this bug go to: https://bugs.launchpad.net/gcc/+bug/1856682/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2050018] Re: [24.10 FEAT] [SEC2356] openCryptoki ep11 token: support protected keys for extractable keys
** Changed in: ubuntu-z-systems Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2050018 Title: [24.10 FEAT] [SEC2356] openCryptoki ep11 token: support protected keys for extractable keys To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2050018/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2050018] Re: [24.10 FEAT] [SEC2356] openCryptoki ep11 token: support protected keys for extractable keys
** Changed in: ubuntu-z-systems Status: Triaged => Fix Committed ** Changed in: opencryptoki (Ubuntu) Status: Triaged => Fix Committed ** Information type changed from Private to Public ** Changed in: opencryptoki (Ubuntu) Assignee: (unassigned) => Frank Heimes (fheimes) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2050018 Title: [24.10 FEAT] [SEC2356] openCryptoki ep11 token: support protected keys for extractable keys To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2050018/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2069040] Re: Compile glibc for Power9
** Changed in: ubuntu-power-systems Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2069040 Title: Compile glibc for Power9 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/2069040/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2074191] Re: Binary RM of 32-bit binaries on s390x
** Tags added: s390x -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2074191 Title: Binary RM of 32-bit binaries on s390x To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/2074191/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2067350] Re: Removal of 31-bit (s390) glibc packages
** Changed in: ubuntu-z-systems Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2067350 Title: Removal of 31-bit (s390) glibc packages To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2067350/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2073554] Re: Grub2 Support for KVM on PowerVM
** Also affects: grub2 (Ubuntu Noble) Importance: Undecided Status: New ** Also affects: grub2 (Ubuntu Oracular) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073554 Title: Grub2 Support for KVM on PowerVM To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/2073554/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2032247] Re: [UBUNTU 23.04] S390: static-PIE programs segfaults if libc6-dev-s390x-cross package is installed
Based on the fact that 23.04 reached it's EOL and with the confirmation in comment #10 that noble is working, I'm closing this bug. ** No longer affects: linux (Ubuntu) ** No longer affects: gcc-12-cross (Ubuntu) ** No longer affects: glibc (Ubuntu) ** No longer affects: gcc-13-cross (Ubuntu) ** Changed in: ubuntu-z-systems Status: New => Fix Released ** Changed in: ubuntu-z-systems Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2032247 Title: [UBUNTU 23.04] S390: static-PIE programs segfaults if libc6-dev-s390x-cross package is installed To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2032247/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2072257] Re: s390-tools: fail to build after gcc-defaults 1.215ubuntu2
** Changed in: ubuntu-z-systems Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072257 Title: s390-tools: fail to build after gcc-defaults 1.215ubuntu2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072257/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2072366] Re: s390-tools zipl breaks when user provides target attributes
** Changed in: ubuntu-z-systems Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072366 Title: s390-tools zipl breaks when user provides target attributes To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2072641] Re: [UBUNTU 22.04] KVM: s390: unhandled guest LPSWEY instruction
** Changed in: ubuntu-z-systems Status: New => Triaged ** Changed in: linux (Ubuntu) Status: New => Triaged -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072641 Title: [UBUNTU 22.04] KVM: s390: unhandled guest LPSWEY instruction To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072641/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2073082] Re: Upgrade qclib to latest version v2.5.0
** Changed in: ubuntu-z-systems Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073082 Title: Upgrade qclib to latest version v2.5.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2073082/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2067350] Re: Removal of 31-bit (s390) glibc packages
** Changed in: ubuntu-z-systems Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team) ** Changed in: glibc (Ubuntu) Importance: Undecided => Medium ** Changed in: ubuntu-z-systems Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2067350 Title: Removal of 31-bit (s390) glibc packages To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2067350/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2049924] Re: WireGuard broken on ppc64el Noble++
** Changed in: ubuntu-power-systems Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2049924 Title: WireGuard broken on ppc64el Noble++ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/2049924/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1880834] Re: qeth: utilize virtual MAC for Layer2 OSD devices
** Description changed: SRU Justification: == [Impact] * A qeth device on a DPM-managed (HMC) IBM Z machine does not obtain its MAC address for layer2 OSD interfaces from the OSA Network Adapter, instead it uses a random MAC address. * This can cause connectivity issues in environments where reliable and pre-determined MAC addresses are required, ie. when doing network configuration based on DHCP. [Fix] * Backport 1: https://launchpadlibrarian.net/481647649/0001-s390-qeth- improve-fallback-to-random-MAC-address.patch * Backport 2: https://launchpadlibrarian.net/481647657/0002-s390-qeth- utilize-virtual-MAC-for-Layer2-OSD-devices.patch [Test Case] * Bring up a qeth L2 OSD interface in DPM-managed (HMC) LPAR * Inspect the interface's MAC address. It should be the same as displayed in the HMC DPM panels. - * Due to the fact that a system is needed where the HMC is in DPM moce + * Due to the fact that a system is needed where the HMC is in DPM mode (rather than in classic mode) this needs to be tested by IBM. [Regression Potential] * There is a certain risk for a regression, since OSA devices are the - standard netweork devices on s390x. + standard network devices on s390x. * But static network configurations are still more popular for the usually long running workload on s390x and not dynamic assignments. * On the other hand qeth devices are s390x only, so this will at least not affect common code or code for other architectures. * The modifications are limited to drivers/s390/net/qeth_*. * The patches are upstream since quite a while, which speaks for their stability. [Other Info] * The upstream patch 21b1702af12e "s390/qeth: improve fallback to random MAC address" got upstream accepted with 4.18, hence is already in all Ubuntu release that are newer than bionic * And the upstream patch b144b99fff69 "s390/qeth: utilize virtual MAC for Layer2 OSD devices" got upstream accepted with 5.0, hence is also already in all Ubuntu release that are newer than bionic. __ ---Problem Description--- qeth on a DPM-managed IBM Z machine does not obtain its MAC Address for L2 OSD interfaces from the OSA Network Adapter. Instead it uses a random MAC Address. This causes connectivity issues in setups where a reliable & pre- determined MAC Address is required - ie. when doing network configuration via DHCP. ---uname output--- Ubuntu 18.04 / vmlinuz-4.15.0-101-generic Machine Type = IBM z14 GA2 ---Debugger--- A debugger is not configured ---Steps to Reproduce--- - Bring up a qeth L2 OSD interface in DPM-managed LPAR. - Inspect the interface's MAC Address. It should be the same as displayed in the DPM Panels. Stack trace output: no Oops output: no System Dump Info: The system is not configured to capture a system dump. -Attach sysctl -a output output to the bug. Backport of "s390/qeth: improve fallback to random MAC address" Backport of "s390/qeth: utilize virtual MAC for Layer2 OSD devices" This ticket is for 18.04 only. Already available with 20.04 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1880834 Title: qeth: utilize virtual MAC for Layer2 OSD devices To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1880834/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads
Thanks Barbara for the verification! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2071471 Title: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2070358] Re: [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel OOPS crash
** Changed in: ubuntu-power-systems Status: In Progress => Fix Committed ** Description changed: SRU Justification: - + [Impact] - * When the sosreport command is executed, a kernel OOPS happens and the system is crashing, - depending on the configuration (but default) the system/LPAR is rebooting. - + * When the sosreport command is executed, a kernel OOPS happens and the system is crashing, + depending on the configuration (but default) the system/LPAR is rebooting. + [Fix] - * e0011bca603c101f2a3c007bdb77f7006fa78fb1 e0011bca603c "nfsd: initialise nfsd_info.mutex early" - + * e0011bca603c101f2a3c007bdb77f7006fa78fb1 e0011bca603c "nfsd: initialise nfsd_info.mutex early" + [Test Case] - * Have a Ubuntu Server 24.04 LTS installation on ppc64el. - * one option is only running sosreport on the system - and - the crash is seen when the sosreport is starting to capture dump - * second option (without sosreport) is: - * CONFIG_NFSD=m (or y) must be set - * mount nfsd if not already, using "$ mount -t nfsd nfsd /proc/fs/nfsd" command - * The kernel oops will happen and the logs will show: -... -BUG: Kernel NULL pointer dereference on read at 0x -Faulting instruction address: 0xc16ff114 -Oops: Kernel access of bad area, sig: 11 [#1] -... - * On a system with that kernel that incl. the above patch -no oops will occur and the sosreport command will execute normally. - + * Have a Ubuntu Server 24.04 LTS installation on ppc64el. + * one option is only running sosreport on the system - and + the crash is seen when the sosreport is starting to capture dump + * second option (without sosreport) is: + * CONFIG_NFSD=m (or y) must be set + * mount nfsd if not already, using "$ mount -t nfsd nfsd /proc/fs/nfsd" command + * The kernel oops will happen and the logs will show: + ... + BUG: Kernel NULL pointer dereference on read at 0x + Faulting instruction address: 0xc16ff114 + Oops: Kernel access of bad area, sig: 11 [#1] + ... + * On a system with that kernel that incl. the above patch + no oops will occur and the sosreport command will execute normally. + [Regression Potential] * There is a certain risk of a regression, with any code modification, - and here because the mutex handling in nfsd is modified. - + and here because the mutex handling in nfsd is modified. + * But the changes are pretty traceable. - + * On top the commit is already upstream reviewed and accepted. - - * The modifications were done by the NFSD maintainer and also tested by IBM. - + + * The modifications were done by the NFSD maintainer and also tested by + IBM. + [Other] * The fix/commit got upstream accepted with kernel v6.10-rc7, - hence Oracular is not affected. - + hence Oracular (with a planned kernel of >=6.10) is not affected. == Comment: #0 - Tasmiya Nalatwad - 2024-05-28 04:35:50 == --- Description --- When sosreport command is executed the kernel OOPS crash is happening and lpar is rebooting. As kdump was enabled the dump is captured. Note : The bug looks similar Bug 206504 Which is seen on z lpars. --- Lpar Details --- 1. PowerVM 2. FW: FW1060.00 (NH1060_026) 3. OS: Ubuntu 24.04 4. Kernel: 6.8.0-31-generic 5. Mem (free -mh): 47Gi 6. cpus: 40 --- Steps to reproduce --- 1. run sosreport command on the lpar and the crash is seen when the sosreport is starting to capture dump. --- Traces --- root@ubuntulp2host:~# sosreport Please note the 'sosreport' command has been deprecated in favor of the new 'sos' command, E.G. 'sos report'. Redirecting to 'sos report ' sosreport (version 4.5.6) This command will collect system configuration and diagnostic information from this Ubuntu system. For more information on Canonical visit: Community Website : https://www.ubuntu.com/ Commercial Support : https://www.canonical.com The generated archive may contain data considered sensitive and its content should be reviewed by the originating organization before being passed to any third party. No changes will be made to system configuration. Press ENTER to continue, or CTRL-C to quit. Optionally, please enter the case id that you are generating this report for []: Setting up archive ... Setting up plugins ... [plugin:lxd] skipped command 'lxc image list': required kmods missing: ip6table_nat, ip6table_raw, bpfilter, iptable_mangle, iptable_filter, iptable_raw, ebtable_filter, ip6table_mangle, ebtables, iptable_nat, ip6_tables, ip6table_filter. [plugin:lxd] skipped command 'lxc list': required kmods missing: ip6table_nat, ip6table_raw, bpfilter, iptable_mangle, iptable_filter, iptable_raw, ebtable_filter, ip6table_mangle, ebtables, iptable_nat, ip6_tables, ip6table_filter. [plugin:lxd] skipped command 'lxc network list': required kmods missing: ip6table_nat,
[Bug 2073554] Re: Grub2 Support for KVM on PowerVM
Hi Mate, this is for Power10 systems. For P10 systems, IBM's commercial hypervisor PowerVM was mandatory. Just recently nested KVM on P10 was introduced (so KVM on top of PowerVM). And this patch adds Radix support (and more) - without Radix any PowerVM KVM LPARs will fail to boot with grub. (That's my understanding, also from the referenced mail thread.) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073554 Title: Grub2 Support for KVM on PowerVM To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/2073554/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2073554] Re: Grub2 Support for KVM on PowerVM
** Also affects: ubuntu-power-systems Importance: Undecided Status: New ** Changed in: ubuntu-power-systems Assignee: (unassigned) => Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage) ** Changed in: grub2 (Ubuntu) Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage) => (unassigned) ** Changed in: ubuntu-power-systems Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073554 Title: Grub2 Support for KVM on PowerVM To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/2073554/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2071774] Re: zfs-dkms FTBFS on Linux 6.10/s390x
** Changed in: ubuntu-z-systems Status: New => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2071774 Title: zfs-dkms FTBFS on Linux 6.10/s390x To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071774/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2071774] Re: zfs-dkms FTBFS on Linux 6.10/s390x
** Changed in: ubuntu-z-systems Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2071774 Title: zfs-dkms FTBFS on Linux 6.10/s390x To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071774/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2072366] Re: s390-tools zipl breaks when user provides target attributes
Hello Utkarsh, many thanks for having sponsored this upload, it's highly appreciated! And I'm sorry that I did had the bug reference in the changelog. That is something I have on my checklist before doing a PPA upload and creating a debdiff, and I've grepped for the bug number, but the bug number is also part of the new quilt patch that I've added . So I'm very happy that you could add it 'on the fly'. Thank you! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072366 Title: s390-tools zipl breaks when user provides target attributes To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2073372] Re: [UBUNTU 20.04] s390x: z13 wcsncmp implementation segfaults if n=1
Hello and thanks for having reported this, actually shared this with us. Is there a simple reproducer or test case that could be used to provoke the segfault and with that to verify that it got fixed with the commit included? ** Package changed: linux (Ubuntu) => glibc (Ubuntu) ** Also affects: ubuntu-z-systems Importance: Undecided Status: New ** Changed in: ubuntu-z-systems Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team) ** Changed in: glibc (Ubuntu) Assignee: Skipper Bug Screeners (skipper-screen-team) => (unassigned) ** Changed in: ubuntu-z-systems Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073372 Title: [UBUNTU 20.04] s390x: z13 wcsncmp implementation segfaults if n=1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2073372/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2073082] Re: Upgrade qclib to latest version v2.5.0
Build was successful, new package was uploaded ... ** Changed in: ubuntu-z-systems Status: In Progress => Fix Committed ** Changed in: qclib (Ubuntu) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073082 Title: Upgrade qclib to latest version v2.5.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2073082/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2073082] Re: Upgrade qclib to latest version v2.5.0
Test build started in this PPA: https://launchpad.net/~fheimes/+archive/ubuntu/lp2073082 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073082 Title: Upgrade qclib to latest version v2.5.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2073082/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2064538] Re: Revert back frame pointers for s390x (remove -fno-omit-frame-pointer but use -mbackchain)
** Summary changed: - Revert back frame pointers for s390x (remove -fno-omit-framepointer but use -mbackchain) + Revert back frame pointers for s390x (remove -fno-omit-frame-pointer but use -mbackchain) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2064538 Title: Revert back frame pointers for s390x (remove -fno-omit-frame-pointer but use -mbackchain) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2064538/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2064539] Re: Revert back frame pointers for ppc64el (remove -fno-omit-frame-pointer)
** Summary changed: - Revert back frame pointers for ppc64el (remove -fno-omit-framepointer) + Revert back frame pointers for ppc64el (remove -fno-omit-frame-pointer) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2064539 Title: Revert back frame pointers for ppc64el (remove -fno-omit-frame- pointer) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/2064539/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2073082] Re: Upgrade qclib to latest version v2.5.0
** Changed in: qclib (Ubuntu) Status: New => In Progress ** Changed in: ubuntu-z-systems Status: New => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073082 Title: Upgrade qclib to latest version v2.5.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2073082/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2073082] [NEW] Upgrade qclib to latest version v2.5.0
Public bug reported: Please bump the version of the qclib package to latest v2.5.0 for oracular. ** Affects: ubuntu-z-systems Importance: Medium Assignee: Skipper Bug Screeners (skipper-screen-team) Status: New ** Affects: qclib (Ubuntu) Importance: Medium Assignee: Frank Heimes (fheimes) Status: New ** Tags: s390x ** Also affects: qclib (Ubuntu) Importance: Undecided Status: New ** Changed in: qclib (Ubuntu) Assignee: (unassigned) => Frank Heimes (fheimes) ** Changed in: ubuntu-z-systems Assignee: Frank Heimes (fheimes) => Skipper Bug Screeners (skipper-screen-team) ** Changed in: ubuntu-z-systems Importance: Undecided => Medium ** Changed in: qclib (Ubuntu) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073082 Title: Upgrade qclib to latest version v2.5.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2073082/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2070358] Re: [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel OOPS crash
Patch was submitted to kernel teams mailing list (thx Patricia): https://lists.ubuntu.com/archives/kernel-team/2024-July/thread.html#152124 ** Changed in: ubuntu-power-systems Status: New => In Progress ** Changed in: linux (Ubuntu) Status: New => In Progress ** Changed in: linux (Ubuntu) Assignee: Patricia Domingues (patriciasd) => Canonical Kernel Team (canonical-kernel-team) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2070358 Title: [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel OOPS crash To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/2070358/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2070358] Re: [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel OOPS crash
** Changed in: linux (Ubuntu) Assignee: (unassigned) => Patricia Domingues (patriciasd) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2070358 Title: [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel OOPS crash To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/2070358/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2072366] Re: s390-tools zipl breaks when user provides target attributes
Great, thx for your validation, Cody! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072366 Title: s390-tools zipl breaks when user provides target attributes To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2044104] Re: [UBUNTU 20.04] chzdev -e is rebuilding initramfs even with zdev:early=0 set
I see Benjamin - thought that I had accidentally removed it by updating the bug (since it was still there in my old browser tab), removed it again. (Btw. looks like comment #10 is an iisue with the bugzilla-launchpad bridge ...) ** No longer affects: initramfs-tools (Ubuntu) ** No longer affects: initramfs-tools (Ubuntu Oracular) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2044104 Title: [UBUNTU 20.04] chzdev -e is rebuilding initramfs even with zdev:early=0 set To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2044104/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1982335] Re: [24.10 FEAT] Valgrind: Support for new IBM Z Hardware (IBM z16)
Many thx Andreas for the quick validation! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1982335 Title: [24.10 FEAT] Valgrind: Support for new IBM Z Hardware (IBM z16) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1982335/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2044104] Re: [UBUNTU 20.04] chzdev -e is rebuilding initramfs even with zdev:early=0 set
@vorlon yes, that's correct. (This bug became a bit abandoned ...) I just changed the target release to oracular and set s390-tools to Fix Released. ** Also affects: s390-tools (Ubuntu Oracular) Importance: Medium Assignee: Skipper Bug Screeners (skipper-screen-team) Status: New ** Also affects: systemd (Ubuntu Oracular) Importance: Medium Assignee: Simon Chopin (schopin) Status: New ** Changed in: s390-tools (Ubuntu Oracular) Status: New => Fix Released ** No longer affects: s390-tools (Ubuntu Noble) ** No longer affects: systemd (Ubuntu Noble) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2044104 Title: [UBUNTU 20.04] chzdev -e is rebuilding initramfs even with zdev:early=0 set To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2044104/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2044104] Re: [UBUNTU 20.04] chzdev -e is rebuilding initramfs even with zdev:early=0 set
Where are the initramfs-tools gone? Added it again ... (sorry) ** Also affects: initramfs-tools (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2044104 Title: [UBUNTU 20.04] chzdev -e is rebuilding initramfs even with zdev:early=0 set To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2044104/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2072366] Re: s390-tools zipl breaks when user provides target attributes
** Tags added: pe-sponsoring-request -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072366 Title: s390-tools zipl breaks when user provides target attributes To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1982335] Re: [24.10 FEAT] Valgrind: Support for new IBM Z Hardware (IBM z16)
** Tags added: pe-sponsoring-request -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1982335 Title: [24.10 FEAT] Valgrind: Support for new IBM Z Hardware (IBM z16) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1982335/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2064539] Re: Revert back frame pointers for ppc64el (remove -fno-omit-framepointer)
** Also affects: linux (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2064539 Title: Revert back frame pointers for ppc64el (remove -fno-omit-framepointer) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/2064539/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2060217] Re: NFSv4 fails to mount in noble/s390x
I'm closing this ticket as Fix Released, since the Ubuntu kernel 6.8.0-38 just transitioned from -proposed to -updates (and -security): linux-generic | 6.8.0-38.38| noble-security| amd64, arm64, armhf, ppc64el, s390x linux-generic | 6.8.0-38.38| noble-proposed| amd64, arm64, armhf, ppc64el, s390x linux-generic | 6.8.0-38.38| noble-updates | amd64, arm64, armhf, ppc64el, s390x ** Changed in: linux (Ubuntu) Status: Fix Committed => Fix Released ** Changed in: ubuntu-z-systems Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2060217 Title: NFSv4 fails to mount in noble/s390x To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-release-notes/+bug/2060217/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2064538] Re: Revert back frame pointers for s390x (remove -fno-omit-framepointer but use -mbackchain)
** Also affects: linux (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2064538 Title: Revert back frame pointers for s390x (remove -fno-omit-framepointer but use -mbackchain) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2064538/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1982335] Re: [24.10 FEAT] Valgrind: Support for new IBM Z Hardware (IBM z16)
I did a version bump to v3.23. s390x built fine, but I had issues with armhf that I've fixed. A test build of the new valgrind version is now available here: https://launchpad.net/~fheimes/+archive/ubuntu/lp1982335 ** Changed in: ubuntu-z-systems Status: Incomplete => In Progress ** Changed in: valgrind (Ubuntu) Status: Expired => In Progress ** Information type changed from Private to Public ** Changed in: valgrind (Ubuntu) Assignee: (unassigned) => Frank Heimes (fheimes) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1982335 Title: [24.10 FEAT] Valgrind: Support for new IBM Z Hardware (IBM z16) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1982335/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1982335] Re: [24.10 FEAT] Valgrind: Support for new IBM Z Hardware (IBM z16)
** Attachment added: "debdiff" https://bugs.launchpad.net/ubuntu/+source/valgrind/+bug/1982335/+attachment/5795842/+files/valgring_oracular_from_3.22.0-0ubuntu3_to_3.23.0-0ubuntu1.diff.gz -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1982335 Title: [24.10 FEAT] Valgrind: Support for new IBM Z Hardware (IBM z16) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1982335/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2072641] Re: [UBUNTU 22.04] KVM: s390: unhandled guest LPSWEY instruction
Great, that it was added to stable 5.15 - thx! (In the upstream commit I only found: Fixes: a3efa8429266 ("KVM: s390: gen_facilities: allow facilities 165, 193, 194 and 196") would have also assumed to see a line starting with: Cc: # ... But anyway, very happy that it comes to 5.15 via upstream !) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072641 Title: [UBUNTU 22.04] KVM: s390: unhandled guest LPSWEY instruction To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072641/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2072641] Re: [UBUNTU 22.04] KVM: s390: unhandled guest LPSWEY instruction
I unfortunately don't see that 4c6abb7f7b34 "KVM: s390: fix LPSWEY handling" got upstream marked as stable update, since in such a case it would have been picked by the Canonical kernel team automatically. ** Also affects: ubuntu-z-systems Importance: Undecided Status: New ** Changed in: ubuntu-z-systems Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team) ** Changed in: linux (Ubuntu) Assignee: Skipper Bug Screeners (skipper-screen-team) => (unassigned) ** Changed in: ubuntu-z-systems Importance: Undecided => Medium ** Changed in: linux (Ubuntu) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072641 Title: [UBUNTU 22.04] KVM: s390: unhandled guest LPSWEY instruction To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072641/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2072641] Re: [UBUNTU 22.04] KVM: s390: unhandled guest LPSWEY instruction
Would it be possible to get a test case aka reproducer on this (so forcing the system into such a rare case)? Since we would need a kind of a test for a potential SRU. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072641 Title: [UBUNTU 22.04] KVM: s390: unhandled guest LPSWEY instruction To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072641/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2072540] Re: rustc: "backchain" on IBM Z platforms is considered unsafe by Rust
** Tags added: s390x -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072540 Title: rustc: "backchain" on IBM Z platforms is considered unsafe by Rust To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/rust-defaults/+bug/2072540/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2062556] Re: [Ubuntu-24.04] Hugepage memory is not getting released even after destroying the guest!
Excuse me Kowshik Jois, you can safely ignore the last few comments from "Ubuntu Kernel Bot (ubuntu-kernel-bot)". After a bug like this is already in Fix Released state, the fix was already published and is out and there is nothing more to do. (The msgs are kind of spam from our kernel team's bot ...) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2062556 Title: [Ubuntu-24.04] Hugepage memory is not getting released even after destroying the guest! To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/2062556/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2072366] Re: s390-tools zipl breaks when user provides target attributes
> > (But btw. why have you attached your Intel ProcCpuinfoMinimal.txt here?) > I used ubuntu-bug to file the bug, and it collected that automatically. It's irrelevant, I've removed it. I see... -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072366 Title: s390-tools zipl breaks when user provides target attributes To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2064538] Re: Revert back frame pointers for s390x (remove -fno-omit-framepointer but use -mbackchain)
** Tags added: reverse-proxy-bugzilla ** Changed in: ubuntu-z-systems Assignee: (unassigned) => bugproxy (bugproxy) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2064538 Title: Revert back frame pointers for s390x (remove -fno-omit-framepointer but use -mbackchain) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2064538/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2071774] Re: zfs-dkms FTBFS on Linux 6.10/s390x
** Changed in: ubuntu-z-systems Assignee: (unassigned) => bugproxy (bugproxy) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2071774 Title: zfs-dkms FTBFS on Linux 6.10/s390x To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071774/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2072366] Re: s390-tools zipl breaks when user provides target attributes
debdiffs ** Attachment added: "lp2072366.tgz" https://bugs.launchpad.net/ubuntu/+source/s390-tools/+bug/2072366/+attachment/5795389/+files/lp2072366.tgz ** Also affects: s390-tools-signed (Ubuntu) Importance: Undecided Status: New ** Changed in: s390-tools-signed (Ubuntu) Status: New => In Progress ** Changed in: s390-tools-signed (Ubuntu) Importance: Undecided => High ** Changed in: s390-tools (Ubuntu) Assignee: (unassigned) => Frank Heimes (fheimes) ** Changed in: s390-tools-signed (Ubuntu) Assignee: (unassigned) => Frank Heimes (fheimes) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072366 Title: s390-tools zipl breaks when user provides target attributes To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2072366] Re: s390-tools zipl breaks when user provides target attributes
** Changed in: ubuntu-z-systems Status: New => In Progress ** Changed in: s390-tools (Ubuntu) Status: New => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072366 Title: s390-tools zipl breaks when user provides target attributes To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2072366] Re: s390-tools zipl breaks when user provides target attributes
Thx Cody for this report and you investigation upstream. An update package, with the above fix included, is currently building in the following PPA: launchpad.net/~fheimes/+archive/ubuntu/lp2072366 (But btw. why have you attached your Intel ProcCpuinfoMinimal.txt here?) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072366 Title: s390-tools zipl breaks when user provides target attributes To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2072366] Re: s390-tools zipl breaks when user provides target attributes
** Tags added: s390x ** Also affects: ubuntu-z-systems Importance: Undecided Status: New ** Changed in: ubuntu-z-systems Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team) ** Changed in: ubuntu-z-systems Importance: Undecided => High ** Changed in: s390-tools (Ubuntu) Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072366 Title: s390-tools zipl breaks when user provides target attributes To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072366/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2072257] Re: s390-tools: fail to build after gcc-defaults 1.215ubuntu2
The debdiffs ... ** Attachment added: "debdiffs.tgz" https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072257/+attachment/5794862/+files/debdiffs.tgz -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072257 Title: s390-tools: fail to build after gcc-defaults 1.215ubuntu2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072257/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2072257] Re: s390-tools: fail to build after gcc-defaults 1.215ubuntu2
Test builds have been completed and successfully tested (I was especially concerned regarding zipl) - see attachment. ** Attachment added: "2072257_verification.txt" https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072257/+attachment/5794861/+files/2072257_verification.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072257 Title: s390-tools: fail to build after gcc-defaults 1.215ubuntu2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072257/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2072257] Re: s390-tools: fail to build after gcc-defaults 1.215ubuntu2
Test builds are currently building in this PPA: launchpad.net/~fheimes/+archive/ubuntu/lp2072257 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072257 Title: s390-tools: fail to build after gcc-defaults 1.215ubuntu2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072257/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2072257] Re: s390-tools: fail to build after gcc-defaults 1.215ubuntu2
Fix is to remove gcc-multilib as dependency from d/control, because due to the removal of 31-bit legacy support gcc-multilib is no longer needed and also (and especially) no longer build for s390x anymore, which led to a failed package rebuilds. ** Tags added: s390x ** Also affects: s390-tools-signed (Ubuntu) Importance: Undecided Status: New ** Also affects: ubuntu-z-systems Importance: Undecided Status: New ** Changed in: s390-tools (Ubuntu) Assignee: (unassigned) => Frank Heimes (fheimes) ** Changed in: s390-tools-signed (Ubuntu) Assignee: (unassigned) => Frank Heimes (fheimes) ** Changed in: ubuntu-z-systems Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team) ** Changed in: s390-tools (Ubuntu) Status: New => In Progress ** Changed in: s390-tools-signed (Ubuntu) Status: New => In Progress ** Changed in: ubuntu-z-systems Status: New => In Progress ** Changed in: s390-tools-signed (Ubuntu) Importance: Undecided => High ** Changed in: s390-tools (Ubuntu) Importance: Undecided => High ** Changed in: ubuntu-z-systems Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072257 Title: s390-tools: fail to build after gcc-defaults 1.215ubuntu2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072257/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads
** Changed in: ubuntu-z-systems Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2071471 Title: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2064530] Re: Include support for .NET 8 for Ubuntu on Power
Great ! - Thank you: $ rmadison --arch=ppc64el dotnet8 dotnet8 | 8.0.105-8.0.5-0ubuntu2 | oracular | ppc64el -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2064530 Title: Include support for .NET 8 for Ubuntu on Power To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/2064530/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2071774] Re: zfs-dkms FTBFS on Linux 6.10/s390x
** Tags added: s390x ** Also affects: ubuntu-z-systems Importance: Undecided Status: New ** Tags added: reverse-proxy-bugzilla -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2071774 Title: zfs-dkms FTBFS on Linux 6.10/s390x To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071774/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads
Many thanks for confirming, Niklas! ** Description changed: SRU Justification: [Impact] * With the introduction of c76c067e488c "s390/pci: Use dma-iommu layer" (upstream with since kernel v6.7-rc1) there was a move (on s390x only) to a different dma-iommu implementation. * And with 92bce97f0c34 "s390/pci: Fix reset of IOMMU software counters" (again upstream since 6.7(rc-1) the IOMMU_DEFAULT_DMA_LAZY kernel config option should now be set to 'yes' by default for s390x. * Since CONFIG_IOMMU_DEFAULT_DMA_STRICT and IOMMU_DEFAULT_DMA_LAZY are related to each other CONFIG_IOMMU_DEFAULT_DMA_STRICT needs to be set to "no" by default, which was upstream done by b2b97a62f055 "Revert "s390: update defconfigs"". * These changes are all upstream, but were not picked up by the Ubuntu kernel config. * And not having these config options set properly is causing significant PCI-related network throughput degradation (up to -72%). * This shows for almost all workloads and numbers of connections, deteriorating with the number of connections increasing. * Especially drastic is the drop for a high number of parallel connections (50 and 250) and for small and medium-size transactional workloads. However, also for streaming-type workloads the degradation is clearly visible (up to 48% degradation). [Fix] * The (upstream accepted) fix is to set IOMMU_DEFAULT_DMA_STRICT=no and IOMMU_DEFAULT_DMA_LAZY=y (which is needed for the changed DAM IOMMU implementation since v6.7). [Test Case] - * Setup two Ubuntu Server 24.04 LPARs (with kernel 6.8) + * Setup two Ubuntu Server 24.04 systems (with kernel 6.8) (one acting as server and as client) that have (PCIe attached) RoCE Express devices attached and that are connected to each other. + + * Verify if the the iommu_group type of the used PCI device is DMA-FQ: +cat /sys/bus/pci/devices/\:00\:00.0/iommu_group/type +DMA-FQ * Sample workload rr1c-200x1000-250 with rr1c-200x1000-250.xml: * Install uperf on both systems, client and server. * Start uperf at server: uperf -s * Start uperf at client: uperf -vai 5 -m uperf-profile.xml * Switch from strict to lazy mode either using the new kernel (or the test build below) or using kernel cmd-line parameter iommu.strict=0. * Restart uperf on server and client, like before. * Verification will be performed by IBM. [Regression Potential] * The is a certain regression potential, since the behavior with the two modified kernel config options will change significantly. * This may solve the (network) throughput issue with PCI devices, but may also come with side-effects on other PCIe based devices (the old compression adapters or the new NVMe carrier cards). [Other] * CCW devices are not affected. * This is s390x-specific only, hence will not affect any other architecture. __ Symptom: Comparing Ubuntu 24.04 (kernelversion: 6.8.0-31-generic) against Ubuntu 22.04, all of our PCI-related network measurements on LPAR show massive throughput degradations (up to -72%). This shows for almost all workloads and numbers of connections, detereorating with the number of connections increasing. Especially drastic is the drop for a high number of parallel connections (50 and 250) and for small and medium-size transactional workloads. However, also for streaming-type workloads the degradation is clearly visible (up to 48% degradation). Problem: With kernel config setting CONFIG_IOMMU_DEFAULT_DMA_STRICT=y, IOMMU DMA mode changed from lazy to strict, causing these massive degradations. Behavior can also be changed with a kernel commandline parameter (iommu.strict) for easy verification. The issue is known and was quickly fixed upstream in December 2023, after being present for little less than two weeks. Upstream fix: https://github.com/torvalds/linux/commit/b2b97a62f055dd638f7f02087331a8380d8f139a Repro: rr1c-200x1000-250 with rr1c-200x1000-250.xml: 0) Install uperf on both systems, client and server. 1) Start uperf at server: uperf -s 2) Start uperf at client: uperf -vai 5 -m uperf-profile.xml 3) Switch from strict to lazy mode using kernel commandline parameter iommu.strict=0.
[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads
Well, 'make defconfig' is what I cannot use, since we have the Ubuntu specific kernel options (and tools). But since "not set" defaults to no, I guess it should be okay to explicitly set CONFIG_IOMMU_DEFAULT_DMA_STRICT=n. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2071471 Title: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads
Modification was sent to kernel teams mailing list: https://lists.ubuntu.com/archives/kernel-team/2024-July/thread.html#151928 ** Changed in: linux (Ubuntu) Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2071471 Title: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads
** Description changed: SRU Justification: [Impact] - * With the introduction of c76c067e488c "s390/pci: Use dma-iommu layer" -(upstream with since kernel v6.7-rc1) there was a move (on s390x only) -to a different dma-iommu implementation. + * With the introduction of c76c067e488c "s390/pci: Use dma-iommu layer" + (upstream with since kernel v6.7-rc1) there was a move (on s390x only) + to a different dma-iommu implementation. - * And with 92bce97f0c34 "s390/pci: Fix reset of IOMMU software counters" -(again upstream since 6.7(rc-1) the IOMMU_DEFAULT_DMA_LAZY kernel config -option should now be set to 'yes' by default for s390x. + * And with 92bce97f0c34 "s390/pci: Fix reset of IOMMU software counters" + (again upstream since 6.7(rc-1) the IOMMU_DEFAULT_DMA_LAZY kernel config + option should now be set to 'yes' by default for s390x. - * Since CONFIG_IOMMU_DEFAULT_DMA_STRICT and IOMMU_DEFAULT_DMA_LAZY -are related to each other CONFIG_IOMMU_DEFAULT_DMA_STRICT needs to be -set to "no" by default, which was upstream done by b2b97a62f055 -"Revert "s390: update defconfigs"". + * Since CONFIG_IOMMU_DEFAULT_DMA_STRICT and IOMMU_DEFAULT_DMA_LAZY + are related to each other CONFIG_IOMMU_DEFAULT_DMA_STRICT needs to be + set to "no" by default, which was upstream done by b2b97a62f055 + "Revert "s390: update defconfigs"". - * These changes are all upstream, but were not picked up by the Ubuntu -kernel config. + * These changes are all upstream, but were not picked up by the Ubuntu + kernel config. - * And not having these config options set properly is causing significant -PCI-related network throughput degradation (up to -72%). + * And not having these config options set properly is causing significant + PCI-related network throughput degradation (up to -72%). - * This shows for almost all workloads and numbers of connections, -deteriorating with the number of connections increasing. + * This shows for almost all workloads and numbers of connections, + deteriorating with the number of connections increasing. - * Especially drastic is the drop for a high number of parallel connections -(50 and 250) and for small and medium-size transactional workloads. -However, also for streaming-type workloads the degradation is clearly -visible (up to 48% degradation). + * Especially drastic is the drop for a high number of parallel connections + (50 and 250) and for small and medium-size transactional workloads. + However, also for streaming-type workloads the degradation is clearly + visible (up to 48% degradation). [Fix] - * The (upstream) fix is to set -IOMMU_DEFAULT_DMA_STRICT=no -and -IOMMU_DEFAULT_DMA_LAZY=y -(which is needed for the changed DAM IOMMU implementation since v6.7). + * The (upstream accepted) fix is to set + IOMMU_DEFAULT_DMA_STRICT=no + and + IOMMU_DEFAULT_DMA_LAZY=y + (which is needed for the changed DAM IOMMU implementation since v6.7). [Test Case] - * Setup two Ubuntu Server 24.04 LPARs (with kernel 6.8) -(one acting as server and as client) -that have (PCIe attached) RoCE Express devices attached -and that are connected to each other. + * Setup two Ubuntu Server 24.04 LPARs (with kernel 6.8) + (one acting as server and as client) + that have (PCIe attached) RoCE Express devices attached + and that are connected to each other. - * Sample workload rr1c-200x1000-250 with rr1c-200x1000-250.xml: - - - - - - - - - - - - - - - + * Sample workload rr1c-200x1000-250 with rr1c-200x1000-250.xml: + + + + + + + + + + + + + + + - * Install uperf on both systems, client and server. + * Install uperf on both systems, client and server. - * Start uperf at server: uperf -s + * Start uperf at server: uperf -s - * Start uperf at client: uperf -vai 5 -m uperf-profile.xml + * Start uperf at client: uperf -vai 5 -m uperf-profile.xml - * Switch from strict to lazy mode -either using the new kernel (or the test build below) -or using kernel cmd-line parameter iommu.strict=0. + * Switch from strict to lazy mode + either using the new kernel (or the test build below) + or using kernel cmd-line parameter iommu.strict=0. - * Restart uperf on server and client, like before. + * Restart uperf on server and client, like before. - * Verification will be performed by
[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads
** Description changed: + SRU Justification: + + [Impact] + + * With the introduction of c76c067e488c "s390/pci: Use dma-iommu layer" +(upstream with since kernel v6.7-rc1) there was a move (on s390x only) +to a different dma-iommu implementation. + + * And with 92bce97f0c34 "s390/pci: Fix reset of IOMMU software counters" +(again upstream since 6.7(rc-1) the IOMMU_DEFAULT_DMA_LAZY kernel config +option should now be set to 'yes' by default for s390x. + + * Since CONFIG_IOMMU_DEFAULT_DMA_STRICT and IOMMU_DEFAULT_DMA_LAZY +are related to each other CONFIG_IOMMU_DEFAULT_DMA_STRICT needs to be +set to "no" by default, which was upstream done by b2b97a62f055 +"Revert "s390: update defconfigs"". + + * These changes are all upstream, but were not picked up by the Ubuntu +kernel config. + + * And not having these config options set properly is causing significant +PCI-related network throughput degradation (up to -72%). + + * This shows for almost all workloads and numbers of connections, +deteriorating with the number of connections increasing. + + * Especially drastic is the drop for a high number of parallel connections +(50 and 250) and for small and medium-size transactional workloads. +However, also for streaming-type workloads the degradation is clearly +visible (up to 48% degradation). + + [Fix] + + * The (upstream) fix is to set +IOMMU_DEFAULT_DMA_STRICT=no +and +IOMMU_DEFAULT_DMA_LAZY=y +(which is needed for the changed DAM IOMMU implementation since v6.7). + + [Test Case] + + * Setup two Ubuntu Server 24.04 LPARs (with kernel 6.8) +(one acting as server and as client) +that have (PCIe attached) RoCE Express devices attached +and that are connected to each other. + + * Sample workload rr1c-200x1000-250 with rr1c-200x1000-250.xml: + + + + + + + + + + + + + + + + + * Install uperf on both systems, client and server. + + * Start uperf at server: uperf -s + + * Start uperf at client: uperf -vai 5 -m uperf-profile.xml + + * Switch from strict to lazy mode +either using the new kernel (or the test build below) +or using kernel cmd-line parameter iommu.strict=0. + + * Restart uperf on server and client, like before. + + * Verification will be performed by IBM. + + [Regression Potential] + + * The is a certain regression potential, since the behavior with +the two modified kernel config options will change significantly. + + * This may solve the (network) throughput issue with PCI devices, +but may also come with side-effects on other PCIe based devices +(the old compression adapters or the new NVMe carrier cards). + + [Other] + + * CCW devices are not affected. + + * This is s390x-specific only, hence will not affect any other + architecture. + + __ + Symptom: Comparing Ubuntu 24.04 (kernelversion: 6.8.0-31-generic) against Ubuntu 22.04, all of our PCI-related network measurements on LPAR show massive throughput degradations (up to -72%). This shows for almost all workloads and numbers of connections, detereorating with the number of connections increasing. Especially drastic is the drop for a high number of parallel connections (50 and 250) and for small and medium-size transactional workloads. However, also for streaming-type workloads the degradation is clearly visible (up to 48% degradation). Problem: With kernel config setting CONFIG_IOMMU_DEFAULT_DMA_STRICT=y, IOMMU DMA mode changed from lazy to strict, causing these massive degradations. Behavior can also be changed with a kernel commandline parameter (iommu.strict) for easy verification. The issue is known and was quickly fixed upstream in December 2023, after being present for little less than two weeks. Upstream fix: https://github.com/torvalds/linux/commit/b2b97a62f055dd638f7f02087331a8380d8f139a Repro: rr1c-200x1000-250 with rr1c-200x1000-250.xml: - - - - - - - - - - - - + + + + + + + + + + + + 0) Install uperf on both systems, client and server. 1) Start uperf at server: uperf -s 2) Start uperf at client: uperf -vai 5 -m uperf-profile.xml 3) Switch from strict to lazy mode using kernel commandline parameter iommu.strict=0. 4) Repeat
[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads
Looks like it's not sufficient to have IOMMU_DEFAULT_DMA_LAZY=y only in addition IOMMU_DEFAULT_DMA_STRICT=n seems to be needed on top (otherwise the build failed for me). (Which I think is not super great upstream, one option should be fine -- with the two kernel options, there are now two unspecific cases: both n and both y - anyway ...) I did a test build in PPA here: https://launchpad.net/~fheimes/+archive/ubuntu/lp2071471 would be great if this can be tried. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2071471 Title: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2068577] Re: [UBUNTU 24.04] Running sosreport causes the system to crash and produce a dump
So the NFS problem that was reported in LP#2060217 is already addressed and is fixed in the Ubuntu Kernel 6.8.0-38. But kernel 6.8.0-38 is not yet fully rolled out - it's currently in the "-proposed" pocket of the Ubuntu archive, but can already be tested and used. However, the way to install from "-proposed" changed starting with 24.04, this is the 'new way': $ sudo add-apt-repository -y "deb http://ports.ubuntu.com/ubuntu-ports/ $(lsb_release -sc)-proposed main universe" $ sudo apt update $ apt-cache policy linux-generic linux-generic: Installed: 6.8.0-36.36 Candidate: 6.8.0-36.36 Version table: 6.8.0-38.38 100 100 http://ports.ubuntu.com/ubuntu-ports noble-proposed/main s390x Packages *** 6.8.0-36.36 500 500 http://ports.ubuntu.com/ubuntu-ports noble-updates/main s390x Packages 500 http://ports.ubuntu.com/ubuntu-ports noble-security/main s390x Packages 100 /var/lib/dpkg/status 6.8.0-31.31 500 500 http://ports.ubuntu.com/ubuntu-ports noble/main s390x Packages $ sudo apt -t=noble-proposed install linux-generic # will install 6.8.0-38 from noble-proposed Testing this kernel (with nfs enabled) would show if the fix for nfs in LP#2060217 is also fixing the situation here. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2068577 Title: [UBUNTU 24.04] Running sosreport causes the system to crash and produce a dump To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2068577/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads
Hi Niklas, thanks for the backgrounds. So to sum it up: The Ubuntu kernel config options for IOMMU_DEFAULT_DMA_LAZY and IOMMU_DEFAULT_DMA_STRICT haven't changed since jammy/22.04: 5.15.0-1.1 to 5.15.0-115.125 CONFIG_IOMMU_DEFAULT_DMA_STRICT=y # CONFIG_IOMMU_DEFAULT_DMA_LAZY is not set 6.8.0-6.6 to 6.8.0-38.38 CONFIG_IOMMU_DEFAULT_DMA_STRICT=y # CONFIG_IOMMU_DEFAULT_DMA_LAZY is not set But with the introduction of c76c067e488c s390/pci: Use dma-iommu layer which moves to a different dma-iommu implementation and 92bce97f0c34 s390/pci: Fix reset of IOMMU software counters (both available since 6.7(rc-1) the IOMMU_DEFAULT_DMA_LAZY kernel config option should be set to 'yes' by default for s390x. Does CONFIG_IOMMU_DEFAULT_DMA_STRICT need to be set to No on top? I don't think so - if lazy is 'yes'. So I believe we can go with 'IOMMU_DEFAULT_DMA_LAZY=y' for s390x only and should be good again. I assume that such situations happen not very often, so it would be ideal if IBM could give us a quick heads-up in such cases (where a kernel config default value for s390x is changed upstream), so that we can double check and potentially take over changes into the Ubuntu config by hand. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2071471 Title: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2070358] Re: [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel OOPS crash
Hello Tasmiya, many thanks that you retried with latest kernel -36. So we'll focus then on incl. commit 8e948c365d9c nfsd: fix oops when reading pool_stats before server is started I just noticed that it's now upstream with v6.10-rc5. ** Changed in: sosreport (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2070358 Title: [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel OOPS crash To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/2070358/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2071471 Title: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads
Btw. I just checked the jammy kernel config options and jammy/22.04 had and still has strict=yes: $ lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description:Ubuntu 22.04.4 LTS Release:22.04 Codename: jammy $ uname -a Linux maasrrc1 5.15.0-112-generic #122-Ubuntu SMP Thu May 23 08:10:47 UTC 2024 s390x s390x s390x GNU/Linux ubuntu@maasrrc1:~$ grep CONFIG_IOMMU_DEFAULT_DMA_STRICT /boot/config-5.15.0-112-generic CONFIG_IOMMU_DEFAULT_DMA_STRICT=y $ grep CONFIG_IOMMU_DEFAULT_DMA_STRICT /boot/config-5.15.0-112-generic I also checked older jammy kernels and strict was always yes. So this has obviously never changed from jammy to noble! Have you modified/tweaked the setting manually on your side before testing on jammy?! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2071471 Title: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads
I just had a look at the Ubuntu kernel noble master-next tree and can find commit: "Revert "s390: update defconfigs"" under the hash b2b97a62f055 and I can see that it got reverted with that: $ git show b2b97a62f055 | grep CONFIG_IOMMU_DEFAULT_DMA_STRICT CONFIG_IOMMU_DEFAULT_DMA_STRICT option needs to be disabled. -CONFIG_IOMMU_DEFAULT_DMA_STRICT=y -CONFIG_IOMMU_DEFAULT_DMA_STRICT=y But git also tells me that it is in since kernel v6.8 and with that since the first ubuntu 6.8 kernel we had: Ubuntu-6.8.0-6 -- so should also be in Ubuntu-6.8.0-31. But it does not seem to be reflected in the kernel options of the Ubuntu kernel: $ lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description:Ubuntu 24.04 LTS Release:24.04 Codename: noble $ uname -a Linux hwe0008 6.8.0-31-generic #31-Ubuntu SMP Sat Apr 20 00:14:26 UTC 2024 s390x s390x s390x GNU/Linux $ grep CONFIG_IOMMU_DEFAULT_DMA_STRICT /boot/config-6.8.0-31-generic CONFIG_IOMMU_DEFAULT_DMA_STRICT=y also not in the current, updated kernel: Linux hwe0008 6.8.0-36-generic #36-Ubuntu SMP Mon Jun 10 09:59:13 UTC 2024 s390x s390x s390x GNU/Linux $ grep CONFIG_IOMMU_DEFAULT_DMA_STRICT /boot/config-6.8.0-31-generic CONFIG_IOMMU_DEFAULT_DMA_STRICT=y For some reason the change in the upstream commit was not taken over into the Ubuntu kernel configs ... ** Changed in: ubuntu-z-systems Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team) ** Changed in: linux (Ubuntu) Assignee: Skipper Bug Screeners (skipper-screen-team) => (unassigned) ** Changed in: ubuntu-z-systems Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2071471 Title: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2071471] Re: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads
** Also affects: ubuntu-z-systems Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2071471 Title: [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2071471/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2067355] Re: Update s390-tools to (currently latest) v2.33.1 in oracular
Uploading the debdiff of the s390-tools-signed package with a fix for a typo in the changelog. ** Patch added: "debdiff_s390-tools-signed_from_2.31.0-0ubuntu5_to_2.33.1-0ubuntu1.diff" https://bugs.launchpad.net/ubuntu/+source/s390-tools/+bug/2067355/+attachment/5792615/+files/debdiff_s390-tools-signed_from_2.31.0-0ubuntu5_to_2.33.1-0ubuntu1.diff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2067355 Title: Update s390-tools to (currently latest) v2.33.1 in oracular To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2067355/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2070329] Re: KOP L2 guest fails to boot with 1 core - SMT8 topology
Looks like the names changed slightly, thanks for pointing the the right upstream commits! And I see that they are marked as stable updates ("Cc: sta...@vger.kernel.org # v6.7+"), which is great! With that they will be soon automatically be picked up by the Canonical kernel team. ** Changed in: ubuntu-power-systems Status: New => Confirmed ** Changed in: linux (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2070329 Title: KOP L2 guest fails to boot with 1 core - SMT8 topology To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/2070329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2067383] Re: [Ubuntu 24.04] hotplug of 68 or more cpus is making the guest shutoff!
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2067383 Title: [Ubuntu 24.04] hotplug of 68 or more cpus is making the guest shutoff! To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/2067383/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2070253] Re: KVM on PowerVM: L2 Guest-Aggressively entering CEDE results in low performance. Possible tuning opportunity.
Hello and thanks for having reported this issue. I was able to find patch "KVM: PPC: Book3S HV nestedv2: Cancel pending DEC exception" accepted in the 'linux-next' tree (7be6ce7043b4cf293c8826a48fd9f56931cef2cf). Do you know if it got also upstream marked for stable updates, and with that will be added to mainline 6.8 as well? I'm asking because, if so, the Canonical kernel team will pick it automatically - but if not, it needs to be manually submitted to the Ubuntu kernel teams mailing list (where we can help with). ** Also affects: ubuntu-power-systems Importance: Undecided Status: New ** Changed in: ubuntu-power-systems Assignee: (unassigned) => Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage) ** Changed in: linux (Ubuntu) Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage) => (unassigned) ** Changed in: linux (Ubuntu) Importance: Undecided => High ** Changed in: ubuntu-power-systems Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2070253 Title: KVM on PowerVM: L2 Guest-Aggressively entering CEDE results in low performance. Possible tuning opportunity. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/2070253/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2070329] Re: KOP L2 guest fails to boot with 1 core - SMT8 topology (Fedora)
Hello and thanks for having reported this issue. Once the patch set 'Fix doorbell emulation for v2 API on PPC' with patches: - arch/powerpc/kvm: Add DPDES support in helper library for Guest state buffer - arch/powerpc/kvm: Fix doorbell emulation for v2 API are upstream accepted (having them in 'linux-next' is sufficient), we can think about picking them. I cannot find them in 'linux-next' yet (https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/log/?qt=grep=Fix+doorbell+emulation+for+v2+API), but assume they are still part of a staging tree and will hit linux-next soon. Based on your statement "The fix has been accepted upstream and will be backported for kernels >= 6.7" I assume the patch(es) are (or will be soon) also upstream marked as "stable updates", and will then land in kernel 6.8 (that we have in 24.04). As soon as this happens, the "stable updates" for 6.8 will be picked by the Canonical kernel team automatically. ** Also affects: ubuntu-power-systems Importance: Undecided Status: New ** Changed in: linux (Ubuntu) Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage) => (unassigned) ** Changed in: ubuntu-power-systems Assignee: (unassigned) => Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage) ** Summary changed: - KOP L2 guest fails to boot with 1 core - SMT8 topology (Fedora) + KOP L2 guest fails to boot with 1 core - SMT8 topology ** Changed in: ubuntu-power-systems Importance: Undecided => High ** Changed in: linux (Ubuntu) Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2070329 Title: KOP L2 guest fails to boot with 1 core - SMT8 topology To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/2070329/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2070358] Re: [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel OOPS crash
** Changed in: ubuntu-power-systems Importance: Undecided => High ** Changed in: linux (Ubuntu) Importance: Undecided => High ** Changed in: sosreport (Ubuntu) Importance: Undecided => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2070358 Title: [Ubuntu 24.04] FW1060.00 (NH1060_026) sosreport is running to Kernel OOPS crash To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/2070358/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs