Activity log for bug #1880834

Date Who What changed Old value New value Message
2020-05-27 08:09:34 bugproxy bug added bug
2020-05-27 08:09:37 bugproxy tags architecture-s39064 bugnameltc-185982 severity-high targetmilestone-inin18044
2020-05-27 08:09:39 bugproxy ubuntu: assignee Skipper Bug Screeners (skipper-screen-team)
2020-05-27 08:09:43 bugproxy affects ubuntu linux (Ubuntu)
2020-05-27 08:22:32 Frank Heimes bug task added ubuntu-z-systems
2020-05-27 08:29:35 Frank Heimes linux (Ubuntu): assignee Skipper Bug Screeners (skipper-screen-team) Canonical Kernel Team (canonical-kernel-team)
2020-05-27 08:29:46 Frank Heimes ubuntu-z-systems: assignee Skipper Bug Screeners (skipper-screen-team)
2020-05-27 08:29:52 Frank Heimes ubuntu-z-systems: status New Incomplete
2020-05-27 08:29:55 Frank Heimes linux (Ubuntu): status New Incomplete
2020-05-27 16:59:30 bugproxy attachment added Backport of "s390/qeth: improve fallback to random MAC address" https://bugs.launchpad.net/bugs/1880834/+attachment/5377433/+files/0001-s390-qeth-improve-fallback-to-random-MAC-address.patch
2020-05-27 16:59:32 bugproxy attachment added Backport of "s390/qeth: utilize virtual MAC for Layer2 OSD devices" https://bugs.launchpad.net/bugs/1880834/+attachment/5377434/+files/0002-s390-qeth-utilize-virtual-MAC-for-Layer2-OSD-devices.patch
2020-05-27 20:15:17 Frank Heimes linux (Ubuntu): status Incomplete Triaged
2020-05-27 20:15:23 Frank Heimes ubuntu-z-systems: status Incomplete Triaged
2020-05-27 20:15:31 Frank Heimes ubuntu-z-systems: importance Undecided High
2020-05-28 12:47:36 Frank Heimes description ---Problem Description--- qeth on a DPM-managed IBM Z machine does not obtain its MAC Address for L2 OSD interfaces from the OSA Network Adapter. Instead it uses a random MAC Address. This causes connectivity issues in setups where a reliable & pre-determined MAC Address is required - ie. when doing network configuration via DHCP. ---uname output--- Ubuntu 18.04 / vmlinuz-4.15.0-101-generic Machine Type = IBM z14 GA2 ---Debugger--- A debugger is not configured ---Steps to Reproduce--- - Bring up a qeth L2 OSD interface in DPM-managed LPAR. - Inspect the interface's MAC Address. It should be the same as displayed in the DPM Panels. Stack trace output: no Oops output: no System Dump Info: The system is not configured to capture a system dump. -Attach sysctl -a output output to the bug. Backport of "s390/qeth: improve fallback to random MAC address" Backport of "s390/qeth: utilize virtual MAC for Layer2 OSD devices" This ticket is for 18.04 only. Already available with 20.04 SRU Justification: ================== [Impact] * A qeth device on a DPM-managed (HMC) IBM Z machine does not obtain its MAC address for layer2 OSD interfaces from the OSA Network Adapter, instead it uses a random MAC address. * This can cause connectivity issues in environments where reliable and pre-determined MAC addresses are required, ie. when doing network configuration based on DHCP. [Fix] * Backport 1: https://launchpadlibrarian.net/481647649/0001-s390-qeth-improve-fallback-to-random-MAC-address.patch * Backport 2: https://launchpadlibrarian.net/481647657/0002-s390-qeth-utilize-virtual-MAC-for-Layer2-OSD-devices.patch [Test Case] * Bring up a qeth L2 OSD interface in DPM-managed (HMC) LPAR * Inspect the interface's MAC address. It should be the same as displayed in the HMC DPM panels. * Due to the fact that a system is needed where the HMC is in DPM moce (rather than in classic mode) this needs to be tested by IBM. [Regression Potential] * There is a certain risk for a regression, since OSA devices are the standard netweork devices on s390x. * But static network configurations are still more popular for the usually long running workload on s390x and not dynamic assignments. * On the other hand qeth devices are s390x only, so this will at least not affect common code or code for other architectures. * The modifications are limited to drivers/s390/net/qeth_*. * The patches are upstream since quite a while, which speaks for their stability. [Other Info] * The upstream patch 21b1702af12e "s390/qeth: improve fallback to random MAC address" got upstream accepted with 4.18, hence is already in all Ubuntu release that are newer than bionic * And the upstream patch b144b99fff69 "s390/qeth: utilize virtual MAC for Layer2 OSD devices" got upstream accepted with 5.0, hence is also already in all Ubuntu release that are newer than bionic. __________ ---Problem Description--- qeth on a DPM-managed IBM Z machine does not obtain its MAC Address for L2 OSD interfaces from the OSA Network Adapter. Instead it uses a random MAC Address. This causes connectivity issues in setups where a reliable & pre-determined MAC Address is required - ie. when doing network configuration via DHCP. ---uname output--- Ubuntu 18.04 / vmlinuz-4.15.0-101-generic Machine Type = IBM z14 GA2 ---Debugger--- A debugger is not configured ---Steps to Reproduce---  - Bring up a qeth L2 OSD interface in DPM-managed LPAR. - Inspect the interface's MAC Address. It should be the same as displayed in the DPM Panels. Stack trace output:  no Oops output:  no System Dump Info:   The system is not configured to capture a system dump. -Attach sysctl -a output output to the bug. Backport of "s390/qeth: improve fallback to random MAC address" Backport of "s390/qeth: utilize virtual MAC for Layer2 OSD devices" This ticket is for 18.04 only. Already available with 20.04
2020-05-28 12:47:44 Frank Heimes linux (Ubuntu): status Triaged In Progress
2020-05-28 12:47:48 Frank Heimes ubuntu-z-systems: status Triaged In Progress
2020-06-03 08:36:55 Frank Heimes nominated for series Ubuntu Bionic
2020-06-03 08:36:55 Frank Heimes bug task added linux (Ubuntu Bionic)
2020-06-03 08:37:42 Frank Heimes linux (Ubuntu Bionic): status New In Progress
2020-06-03 08:37:48 Frank Heimes linux (Ubuntu): status In Progress Fix Released
2020-06-03 08:42:16 Frank Heimes nominated for series Ubuntu Groovy
2020-06-03 08:42:16 Frank Heimes bug task added linux (Ubuntu Groovy)
2020-06-03 08:42:16 Frank Heimes nominated for series Ubuntu Focal
2020-06-03 08:42:16 Frank Heimes bug task added linux (Ubuntu Focal)
2020-06-03 08:42:16 Frank Heimes nominated for series Ubuntu Eoan
2020-06-03 08:42:16 Frank Heimes bug task added linux (Ubuntu Eoan)
2020-06-03 08:42:27 Frank Heimes linux (Ubuntu Focal): status New Fix Released
2020-06-03 08:42:33 Frank Heimes linux (Ubuntu Eoan): status New Fix Committed
2020-06-03 08:44:10 Frank Heimes linux (Ubuntu Eoan): status Fix Committed Fix Released
2020-06-05 05:24:04 Khaled El Mously linux (Ubuntu Bionic): status In Progress Fix Committed
2020-06-05 05:38:19 Frank Heimes ubuntu-z-systems: status In Progress Fix Committed
2020-06-10 17:45:25 Ubuntu Kernel Bot tags architecture-s39064 bugnameltc-185982 severity-high targetmilestone-inin18044 architecture-s39064 bugnameltc-185982 severity-high targetmilestone-inin18044 verification-needed-bionic
2020-06-10 19:05:48 Frank Heimes tags architecture-s39064 bugnameltc-185982 severity-high targetmilestone-inin18044 verification-needed-bionic architecture-s39064 bugnameltc-185982 severity-high targetmilestone-inin18044 verification-done-bionic
2020-07-01 10:28:55 Launchpad Janitor linux (Ubuntu Bionic): status Fix Committed Fix Released
2020-07-01 10:28:55 Launchpad Janitor cve linked 2019-12380
2020-07-01 10:28:55 Launchpad Janitor cve linked 2019-16089
2020-07-01 10:28:55 Launchpad Janitor cve linked 2019-19036
2020-07-01 10:28:55 Launchpad Janitor cve linked 2019-19039
2020-07-01 10:28:55 Launchpad Janitor cve linked 2019-19318
2020-07-01 10:28:55 Launchpad Janitor cve linked 2019-19377
2020-07-01 10:28:55 Launchpad Janitor cve linked 2019-19642
2020-07-01 10:28:55 Launchpad Janitor cve linked 2019-19813
2020-07-01 10:28:55 Launchpad Janitor cve linked 2019-19816
2020-07-01 10:28:55 Launchpad Janitor cve linked 2020-0543
2020-07-01 10:28:55 Launchpad Janitor cve linked 2020-10711
2020-07-01 10:28:55 Launchpad Janitor cve linked 2020-13143
2020-07-01 10:50:55 Frank Heimes ubuntu-z-systems: status Fix Committed Fix Released