Activity log for bug #1953338

Date Who What changed Old value New value Message
2021-12-06 11:29:38 bugproxy bug added bug
2021-12-06 11:29:41 bugproxy tags architecture-s39064 bugnameltc-195467 severity-high targetmilestone-inin2004
2021-12-06 11:29:43 bugproxy ubuntu: assignee Skipper Bug Screeners (skipper-screen-team)
2021-12-06 11:29:49 bugproxy affects ubuntu linux (Ubuntu)
2021-12-06 12:55:13 Frank Heimes affects linux (Ubuntu) qemu (Ubuntu)
2021-12-06 12:55:37 Frank Heimes bug task added ubuntu-z-systems
2021-12-06 12:59:00 Frank Heimes ubuntu-z-systems: assignee Skipper Bug Screeners (skipper-screen-team)
2021-12-06 12:59:14 Frank Heimes qemu (Ubuntu): assignee Skipper Bug Screeners (skipper-screen-team) Canonical Server Team (canonical-server)
2021-12-06 12:59:21 Frank Heimes ubuntu-z-systems: importance Undecided High
2021-12-06 13:28:02 Christian Ehrhardt  qemu (Ubuntu): status New Incomplete
2021-12-06 16:09:31 bugproxy attachment added 0001-s390-sclp-get-machine-once-during-read-scp-cpu-info https://bugs.launchpad.net/bugs/1953338/+attachment/5545751/+files/0001-s390-sclp-get-machine-once-during-read-scp-cpu-info.patch
2021-12-06 16:19:41 bugproxy attachment added 0002-s390-sclp-rework-sclp-boundary-checks https://bugs.launchpad.net/bugs/1953338/+attachment/5545762/+files/0002-s390-sclp-rework-sclp-boundary-checks.patch
2021-12-06 16:19:44 bugproxy attachment added 0003-s390-sclp-read-sccb-from-mem-based-on-provided-length https://bugs.launchpad.net/bugs/1953338/+attachment/5545763/+files/0003-s390-sclp-read-sccb-from-mem-based-on-provided-lengt.patch
2021-12-06 16:19:46 bugproxy attachment added 0004-s390-sclp-check-sccb-len-before-filling-in-data https://bugs.launchpad.net/bugs/1953338/+attachment/5545764/+files/0004-s390-sclp-check-sccb-len-before-filling-in-data.patch
2021-12-06 16:19:48 bugproxy attachment added 0005-s390-sclp-use-cpu-offset-to-locate-cpu-entries https://bugs.launchpad.net/bugs/1953338/+attachment/5545765/+files/0005-s390-sclp-use-cpu-offset-to-locate-cpu-entries.patch
2021-12-06 16:19:51 bugproxy attachment added 0006-s390-sclp-add-extended-length-sccb-support-for-kvm-guest https://bugs.launchpad.net/bugs/1953338/+attachment/5545766/+files/0006-s390-sclp-add-extended-length-sccb-support-for-kvm-g.patch
2021-12-06 16:19:54 bugproxy attachment added 0007-s390-guest-support-for-diagnose-0x318 https://bugs.launchpad.net/bugs/1953338/+attachment/5545767/+files/0007-s390-guest-support-for-diagnose-0x318.patch
2021-12-06 16:19:56 bugproxy attachment added 0008-s390-kvm-fix-diag318-propagation-and-reset-functiona https://bugs.launchpad.net/bugs/1953338/+attachment/5545768/+files/0008-s390-kvm-fix-diag318-propagation-and-reset-functiona.patch
2021-12-07 06:39:15 Frank Heimes qemu (Ubuntu): status Incomplete New
2021-12-07 14:34:26 Christian Ehrhardt  qemu (Ubuntu): status New Fix Released
2021-12-07 14:34:36 Christian Ehrhardt  nominated for series Ubuntu Focal
2021-12-07 14:34:36 Christian Ehrhardt  bug task added qemu (Ubuntu Focal)
2021-12-07 14:35:17 Christian Ehrhardt  qemu (Ubuntu Focal): status New Triaged
2022-01-13 14:07:30 Frank Heimes ubuntu-z-systems: status New Triaged
2022-01-13 15:35:55 Christian Ehrhardt  qemu (Ubuntu Focal): status Triaged Incomplete
2022-01-21 03:59:53 bugproxy attachment added 0001-s390-sclp-get-machine-once-during-read-scp-cpu-info https://bugs.launchpad.net/bugs/1953338/+attachment/5556015/+files/0001-s390-sclp-get-machine-once-during-read-scp-cpu-info.patch
2022-01-21 03:59:54 bugproxy attachment added 0002-s390-sclp-rework-sclp-boundary-checks https://bugs.launchpad.net/bugs/1953338/+attachment/5556016/+files/0002-s390-sclp-rework-sclp-boundary-checks.patch
2022-01-21 03:59:56 bugproxy attachment added 0003-s390-sclp-read-sccb-from-mem-based-on-provided-lengt https://bugs.launchpad.net/bugs/1953338/+attachment/5556017/+files/0003-s390-sclp-read-sccb-from-mem-based-on-provided-lengt.patch
2022-01-21 03:59:58 bugproxy attachment added 0004-s390-sclp-check-sccb-len-before-filling-in-data https://bugs.launchpad.net/bugs/1953338/+attachment/5556018/+files/0004-s390-sclp-check-sccb-len-before-filling-in-data.patch
2022-01-21 04:10:03 bugproxy attachment added 0005-s390-sclp-use-cpu-offset-to-locate-cpu-entries https://bugs.launchpad.net/bugs/1953338/+attachment/5556021/+files/0005-s390-sclp-use-cpu-offset-to-locate-cpu-entries.patch
2022-01-21 04:10:05 bugproxy attachment added 0006-s390-sclp-add-extended-length-sccb-support-for-kvm-g https://bugs.launchpad.net/bugs/1953338/+attachment/5556022/+files/0006-s390-sclp-add-extended-length-sccb-support-for-kvm-g.patch
2022-01-21 04:10:07 bugproxy attachment added 0007-s390-guest-support-for-diagnose-0x318 https://bugs.launchpad.net/bugs/1953338/+attachment/5556023/+files/0007-s390-guest-support-for-diagnose-0x318.patch
2022-01-21 04:10:10 bugproxy attachment added 0008-s390x-pv-Remove-sclp-boundary-checks https://bugs.launchpad.net/bugs/1953338/+attachment/5556024/+files/0008-s390x-pv-Remove-sclp-boundary-checks.patch
2022-01-21 04:10:12 bugproxy attachment added 0009-s390x-pv-Fix-diag318-PV-fencing https://bugs.launchpad.net/bugs/1953338/+attachment/5556025/+files/0009-s390x-pv-Fix-diag318-PV-fencing.patch
2022-01-25 15:47:13 Frank Heimes description Hardware diagnose data (diag 318) of KVM guest kernel cannot be handled. Fix needed to enhance problem determination of guest kernel under KVM Solution provided by Collin: All patches are provided to enable the DIAGNOSE 0x318 problem determination aid for a QEMU guest. Analogous KVM patches are required. This solution required the prerequisite Extended-Length SCCB patches as well. I've applied a bugfix related to resetting the diag318 to one of the patches (one line fix -- upstream conversation here: https://lists.gnu.org/archive/html/qemu-devel/2021-11/msg03618.html) SRU Justification: ================== [Impact] * Hardware diagnose data (diag 318) of KVM guest kernel cannot be handled. * A fix is needed to enhance problem determination of guest kernel under KVM using DIAG 0x318 instruction execution. * The s390x diagnose 318 instruction sets the control program name code (CPNC) and control program version code (CPVC) to provide useful information regarding the OS during debugging. * The CPNC is explicitly set to 4 to indicate a Linux/KVM environment. [Fix] * In general the following 9 patches (backports) are needed: * "[PATCH 1/9] s390/sclp: get machine once during read scp/cpu info" https://launchpadlibrarian.net/581388471/0001-s390-sclp-get-machine-once-during-read-scp-cpu-info.patch * "[PATCH 2/9] s390/sclp: rework sclp boundary checks" https://launchpadlibrarian.net/581388472/0002-s390-sclp-rework-sclp-boundary-checks.patch * "[PATCH 3/9] s390/sclp: read sccb from mem based on provided length" https://launchpadlibrarian.net/581388474/0003-s390-sclp-read-sccb-from-mem-based-on-provided-lengt.patch * "[PATCH 4/9] s390/sclp: check sccb len before filling in data" https://launchpadlibrarian.net/581388476/0004-s390-sclp-check-sccb-len-before-filling-in-data.patch * "[PATCH 5/9] s390/sclp: use cpu offset to locate cpu entries" https://launchpadlibrarian.net/581389965/0005-s390-sclp-use-cpu-offset-to-locate-cpu-entries.patch * "[PATCH 6/9] s390/sclp: add extended-length sccb support for kvm guest" https://launchpadlibrarian.net/581389970/0006-s390-sclp-add-extended-length-sccb-support-for-kvm-g.patch * "[PATCH 7/9] s390: guest support for diagnose 0x318" https://launchpadlibrarian.net/581389974/0007-s390-guest-support-for-diagnose-0x318.patch * "[PATCH 8/9] s390x: pv: Remove sclp boundary checks" https://launchpadlibrarian.net/581389981/0008-s390x-pv-Remove-sclp-boundary-checks.patch * "[PATCH 9/9] s390x: pv: Fix diag318 PV fencing" https://launchpadlibrarian.net/581389982/0009-s390x-pv-Fix-diag318-PV-fencing.patch [Test Case] * Setup an IBM Z or LinuxONE LPAR with Ubuntu Server as KVM host. * And setup an Ubuntu KVM virtual machine on top. * It can then be observed if the CPNC (diag318 data) has been successfully set by looking at the s390dbf messages for the KVM guest. * The CPNC will always be 4 (denotes Linux environment). * Another way to test this is by running the sync_regs_test under tools/testing/selftests/kvm/s390x/sync_regs_test. Just running the kernel self test suite can trigger this. * It is important that the patched qemu is tested with correct patched kernel, since one required the other - they can be found here: qemu: https://launchpad.net/~ci-train-ppa-service/+archive/ubuntu/4767 kernel: https://launchpad.net/~fheimes/+archive/ubuntu/lp1953334 [Where problems could occur] * The approach here is to provide additional debug and diagnose information on top. * Hence even if the diag318 changes are broken, the existing functionality shouldn't be harmed. * However, with the functional changes broken code could be introduced (e.g. due to erroneous pointer arithmetic for example) that does not compile or causes crashes. But this is what the test builds are for qemu: https://launchpad.net/~ci-train-ppa-service/+archive/ubuntu/4767 (kernel: https://launchpad.net/~fheimes/+archive/ubuntu/lp1953334) * On top the diag318 diagnose data might not properly provided - maybe empty or wrong. Again that is what the test builds and the verification later is targeted at. [Other] * LP#1953334 is related to this bug and covers the Kernel part. __________ Hardware diagnose data (diag 318) of KVM guest kernel cannot be handled. Fix needed to enhance problem determination of guest kernel under KVM Solution provided by Collin: All patches are provided to enable the DIAGNOSE 0x318 problem determination aid for a QEMU guest. Analogous KVM patches are required. This solution required the prerequisite Extended-Length SCCB patches as well. I've applied a bugfix related to resetting the diag318 to one of the patches (one line fix -- upstream conversation here: https://lists.gnu.org/archive/html/qemu-devel/2021-11/msg03618.html)
2022-01-25 16:10:47 Christian Ehrhardt  tags architecture-s39064 bugnameltc-195467 severity-high targetmilestone-inin2004 architecture-s39064 block-proposed bugnameltc-195467 severity-high targetmilestone-inin2004
2022-01-26 14:21:01 Christian Ehrhardt  qemu (Ubuntu Focal): status Incomplete In Progress
2022-01-26 14:26:58 Christian Ehrhardt  description SRU Justification: ================== [Impact] * Hardware diagnose data (diag 318) of KVM guest kernel cannot be handled. * A fix is needed to enhance problem determination of guest kernel under KVM using DIAG 0x318 instruction execution. * The s390x diagnose 318 instruction sets the control program name code (CPNC) and control program version code (CPVC) to provide useful information regarding the OS during debugging. * The CPNC is explicitly set to 4 to indicate a Linux/KVM environment. [Fix] * In general the following 9 patches (backports) are needed: * "[PATCH 1/9] s390/sclp: get machine once during read scp/cpu info" https://launchpadlibrarian.net/581388471/0001-s390-sclp-get-machine-once-during-read-scp-cpu-info.patch * "[PATCH 2/9] s390/sclp: rework sclp boundary checks" https://launchpadlibrarian.net/581388472/0002-s390-sclp-rework-sclp-boundary-checks.patch * "[PATCH 3/9] s390/sclp: read sccb from mem based on provided length" https://launchpadlibrarian.net/581388474/0003-s390-sclp-read-sccb-from-mem-based-on-provided-lengt.patch * "[PATCH 4/9] s390/sclp: check sccb len before filling in data" https://launchpadlibrarian.net/581388476/0004-s390-sclp-check-sccb-len-before-filling-in-data.patch * "[PATCH 5/9] s390/sclp: use cpu offset to locate cpu entries" https://launchpadlibrarian.net/581389965/0005-s390-sclp-use-cpu-offset-to-locate-cpu-entries.patch * "[PATCH 6/9] s390/sclp: add extended-length sccb support for kvm guest" https://launchpadlibrarian.net/581389970/0006-s390-sclp-add-extended-length-sccb-support-for-kvm-g.patch * "[PATCH 7/9] s390: guest support for diagnose 0x318" https://launchpadlibrarian.net/581389974/0007-s390-guest-support-for-diagnose-0x318.patch * "[PATCH 8/9] s390x: pv: Remove sclp boundary checks" https://launchpadlibrarian.net/581389981/0008-s390x-pv-Remove-sclp-boundary-checks.patch * "[PATCH 9/9] s390x: pv: Fix diag318 PV fencing" https://launchpadlibrarian.net/581389982/0009-s390x-pv-Fix-diag318-PV-fencing.patch [Test Case] * Setup an IBM Z or LinuxONE LPAR with Ubuntu Server as KVM host. * And setup an Ubuntu KVM virtual machine on top. * It can then be observed if the CPNC (diag318 data) has been successfully set by looking at the s390dbf messages for the KVM guest. * The CPNC will always be 4 (denotes Linux environment). * Another way to test this is by running the sync_regs_test under tools/testing/selftests/kvm/s390x/sync_regs_test. Just running the kernel self test suite can trigger this. * It is important that the patched qemu is tested with correct patched kernel, since one required the other - they can be found here: qemu: https://launchpad.net/~ci-train-ppa-service/+archive/ubuntu/4767 kernel: https://launchpad.net/~fheimes/+archive/ubuntu/lp1953334 [Where problems could occur] * The approach here is to provide additional debug and diagnose information on top. * Hence even if the diag318 changes are broken, the existing functionality shouldn't be harmed. * However, with the functional changes broken code could be introduced (e.g. due to erroneous pointer arithmetic for example) that does not compile or causes crashes. But this is what the test builds are for qemu: https://launchpad.net/~ci-train-ppa-service/+archive/ubuntu/4767 (kernel: https://launchpad.net/~fheimes/+archive/ubuntu/lp1953334) * On top the diag318 diagnose data might not properly provided - maybe empty or wrong. Again that is what the test builds and the verification later is targeted at. [Other] * LP#1953334 is related to this bug and covers the Kernel part. __________ Hardware diagnose data (diag 318) of KVM guest kernel cannot be handled. Fix needed to enhance problem determination of guest kernel under KVM Solution provided by Collin: All patches are provided to enable the DIAGNOSE 0x318 problem determination aid for a QEMU guest. Analogous KVM patches are required. This solution required the prerequisite Extended-Length SCCB patches as well. I've applied a bugfix related to resetting the diag318 to one of the patches (one line fix -- upstream conversation here: https://lists.gnu.org/archive/html/qemu-devel/2021-11/msg03618.html) SRU Justification: ================== [Impact] * Hardware diagnose data (diag 318) of KVM guest kernel cannot be handled. * A fix is needed to enhance problem determination of guest kernel under KVM using DIAG 0x318 instruction execution. * The s390x diagnose 318 instruction sets the control program name code (CPNC) and control program version code (CPVC) to provide useful information regarding the OS during debugging. * The CPNC is explicitly set to 4 to indicate a Linux/KVM environment. * The user story to this is, that s390x clearly is a platform that has virtualization for ages, and as part of that established diag calls to allow you add data to guests. This helps live management and/or guest debugging in case of problems. For KVM guests this data is wrong/incomplete so far and this is the fix for it. You might want to see [1] for the base-feature that this fixes. And do not say it is ugly, I did not send the PoP page about diags :-) [1]: https://git.mentality.rip/OpenE2K/qemu-e2k/commit/fabdada9357b [Fix] * In general the following 9 patches (backports) are needed: * "[PATCH 1/9] s390/sclp: get machine once during read scp/cpu info"   https://launchpadlibrarian.net/581388471/0001-s390-sclp-get-machine-once-during-read-scp-cpu-info.patch * "[PATCH 2/9] s390/sclp: rework sclp boundary checks"   https://launchpadlibrarian.net/581388472/0002-s390-sclp-rework-sclp-boundary-checks.patch * "[PATCH 3/9] s390/sclp: read sccb from mem based on provided length"   https://launchpadlibrarian.net/581388474/0003-s390-sclp-read-sccb-from-mem-based-on-provided-lengt.patch * "[PATCH 4/9] s390/sclp: check sccb len before filling in data"   https://launchpadlibrarian.net/581388476/0004-s390-sclp-check-sccb-len-before-filling-in-data.patch * "[PATCH 5/9] s390/sclp: use cpu offset to locate cpu entries"   https://launchpadlibrarian.net/581389965/0005-s390-sclp-use-cpu-offset-to-locate-cpu-entries.patch * "[PATCH 6/9] s390/sclp: add extended-length sccb support for kvm guest"   https://launchpadlibrarian.net/581389970/0006-s390-sclp-add-extended-length-sccb-support-for-kvm-g.patch * "[PATCH 7/9] s390: guest support for diagnose 0x318"   https://launchpadlibrarian.net/581389974/0007-s390-guest-support-for-diagnose-0x318.patch * "[PATCH 8/9] s390x: pv: Remove sclp boundary checks"   https://launchpadlibrarian.net/581389981/0008-s390x-pv-Remove-sclp-boundary-checks.patch * "[PATCH 9/9] s390x: pv: Fix diag318 PV fencing"   https://launchpadlibrarian.net/581389982/0009-s390x-pv-Fix-diag318-PV-fencing.patch [Test Case] * Setup an IBM Z or LinuxONE LPAR with Ubuntu Server as KVM host. * And setup an Ubuntu KVM virtual machine on top. * It can then be observed if the CPNC (diag318 data) has been successfully set by looking at the s390dbf messages for the KVM guest. * The CPNC will always be 4 (denotes Linux environment). * Another way to test this is by running the sync_regs_test under tools/testing/selftests/kvm/s390x/sync_regs_test. Just running the kernel self test suite can trigger this. * It is important that the patched qemu is tested with correct patched kernel, since one required the other - they can be found here:   qemu: https://launchpad.net/~ci-train-ppa-service/+archive/ubuntu/4767   kernel: https://launchpad.net/~fheimes/+archive/ubuntu/lp1953334 [Where problems could occur] * The approach here is to provide additional debug and diagnose information on top. * Hence even if the diag318 changes are broken, the existing functionality shouldn't be harmed. * However, with the functional changes broken code could be introduced (e.g. due to erroneous pointer arithmetic for example) that does not compile or causes crashes. But this is what the test builds are for qemu: https://launchpad.net/~ci-train-ppa-service/+archive/ubuntu/4767 (kernel: https://launchpad.net/~fheimes/+archive/ubuntu/lp1953334) * On top the diag318 diagnose data might not properly provided - maybe empty or wrong. Again that is what the test builds and the verification later is targeted at. [Other] * LP#1953334 is related to this bug and covers the Kernel part. __________ Hardware diagnose data (diag 318) of KVM guest kernel cannot be handled. Fix needed to enhance problem determination of guest kernel under KVM Solution provided by Collin: All patches are provided to enable the DIAGNOSE 0x318 problem determination aid for a QEMU guest. Analogous KVM patches are required. This solution required the prerequisite Extended-Length SCCB patches as well. I've applied a bugfix related to resetting the diag318 to one of the patches (one line fix -- upstream conversation here: https://lists.gnu.org/archive/html/qemu-devel/2021-11/msg03618.html)
2022-01-26 14:31:47 Frank Heimes ubuntu-z-systems: status Triaged In Progress
2022-02-01 18:33:47 Brian Murray tags architecture-s39064 block-proposed bugnameltc-195467 severity-high targetmilestone-inin2004 architecture-s39064 block-proposed block-proposed-focal bugnameltc-195467 severity-high targetmilestone-inin2004
2022-02-01 18:34:59 Brian Murray qemu (Ubuntu Focal): status In Progress Fix Committed
2022-02-01 18:35:01 Brian Murray bug added subscriber Ubuntu Stable Release Updates Team
2022-02-01 18:35:03 Brian Murray bug added subscriber SRU Verification
2022-02-01 18:35:07 Brian Murray tags architecture-s39064 block-proposed block-proposed-focal bugnameltc-195467 severity-high targetmilestone-inin2004 architecture-s39064 block-proposed block-proposed-focal bugnameltc-195467 severity-high targetmilestone-inin2004 verification-needed verification-needed-focal
2022-02-01 18:56:40 Frank Heimes ubuntu-z-systems: status In Progress Fix Committed
2022-02-02 11:52:29 Frank Heimes attachment added qemu_PPA_test_on_focal.txt https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1953338/+attachment/5558743/+files/qemu_PPA_test_on_focal.txt
2022-02-02 11:52:55 Frank Heimes tags architecture-s39064 block-proposed block-proposed-focal bugnameltc-195467 severity-high targetmilestone-inin2004 verification-needed verification-needed-focal architecture-s39064 block-proposed block-proposed-focal bugnameltc-195467 severity-high targetmilestone-inin2004 verification-done verification-done-focal
2022-02-28 12:38:54 Launchpad Janitor qemu (Ubuntu Focal): status Fix Committed Fix Released
2022-02-28 12:38:54 Launchpad Janitor cve linked 2021-20196
2022-02-28 12:38:54 Launchpad Janitor cve linked 2021-20203
2022-02-28 12:38:54 Launchpad Janitor cve linked 2021-3682
2022-02-28 12:38:54 Launchpad Janitor cve linked 2021-3748
2022-02-28 12:38:54 Launchpad Janitor cve linked 2021-3930
2022-03-10 07:30:10 Frank Heimes ubuntu-z-systems: status Fix Committed Fix Released