** Changed in: linux (Ubuntu Jammy)
Status: New => In Progress
** Changed in: linux (Ubuntu Noble)
Status: New => In Progress
** Changed in: ubuntu-z-systems
Status: New => In Progress
** Description changed:
+ SRU Justification:
+
+ [ Impact ]
+
+ * The CPU Measurement Facility (CPU MF) crypto counter set
+ is not listed in the device sysfs tree - it's not exported
+ in the sysfs directory /sys/devices/cpum_cf/events.
+
+ * The attribute files for each CPU-MF counter defined
+ in the crypto counter set is missing.
+
+ * This is caused by the counter second version number of CPU MF
+ hardware being incremented on new machines.
+
+ * This causes a sanity check to fail,
+ but the counters are supported by hardware.
+
+ * The solution is to remove the upper limit in counter second
+ version number check.
+
+ [ Fix ]
+
+ * f10933cbd2df f10933cbd2dfddf6273698a45f76db9bafd8150f "s390/cpum_cf:
+ make crypto counters upward compatible across machine types"
+
+ * The fix was upstream accepted with kernel v6.10(-rc1).
+
+ [ Test Plan ]
+
+ * Run the following commands on a new machine generation:
+ (hence only doable by IBM)
+ # ls -l /sys/devices/cpum_cf/events/ | grep AES
+
+ * If the output is empty than this patch is required.
+
+ * With a patched kernel the output should be like:
+ # ls /sys/devices/cpum_cf/events/ | grep AES
+ AES_BLOCKED_CYCLES
+ AES_BLOCKED_FUNCTIONS
+ AES_CYCLES
+ AES_FUNCTIONS
+
+ [ Where problems could occur ]
+
+ * This affects s390x only - CPU MF is s390-specific,
+ and only s390 specific code is modified.
+
+ * And it furthermore is limited to the crypto counter set
+ of CPU MF.
+
+ * So any impact is likely limited to hardware crypto counters
+ on s390x only.
+
+ * In s390/kernel/perf_cpum_cf.c the else if case got changed from
+ explicitly checking for 6 or 7 to >= 6 which seems to require
+ attention for future 8 and more cases.
+
+ * In s390/kernel/perf_cpum_cf_events.c the switch (ci.csvn) statement
+ was changed to an if / else if with similar logic.
+ Again attentioin for any potential future cases >= 8.
+
+ * It does not look like currently used cases (1..5 and 6..7)
+ are affected by the modification, just >7.
+
+ * Test build of patched jammy and noble s390x kernels were build
+ and are avaiable here:
+ https://launchpad.net/~fheimes/+archive/ubuntu/lp2074380
+
+ [ Other Info ]
+
+ * Since the code/fix was upstream accepted with kernel v6.10(-rc1)
+ it does not affect the current development release oracular.
+
+ * This SRU can also be seen under the umbrella of new
+ hardware enablement.
+
+ * Since it requires special hw, the verification needs to be
+ done by IBM.
+
+ __________
+
Description: kernel: s390/cpum_cf: make crypto counters upward
compatible
Symptom: The CPU Measurement facility crypto counter set is not
- listed in the device sysfs tree.
+ listed in the device sysfs tree.
Problem: The CPU Measurement facility crypto counter set is not
- exported in the sysfs directory
- /sys/devices/cpum_cf/events.
- The attribute files for each CPU-MF counter defined
- in the crypto counter set is missing. This is caused
- by the counter second version number of the CPU
- Measurement Facility hardware being incremented on
- new machines. This causes a sanity check to fail,
- but the counters are supported by hardware.
+ exported in the sysfs directory
+ /sys/devices/cpum_cf/events.
+ The attribute files for each CPU-MF counter defined
+ in the crypto counter set is missing. This is caused
+ by the counter second version number of the CPU
+ Measurement Facility hardware being incremented on
+ new machines. This causes a sanity check to fail,
+ but the counters are supported by hardware.
Solution: Remove upper limit in counter second version number
- check.
+ check.
Reproduction: Run command on a new machine generation:
- # ls -l /sys/devices/cpum_cf/events/ | grep AES
- #
- If the output is empty than this patch is required.
- The output should be:
- # ls /sys/devices/cpum_cf/events/ | grep AES
- AES_BLOCKED_CYCLES
- AES_BLOCKED_FUNCTIONS
- AES_CYCLES
- AES_FUNCTIONS
- #
+ # ls -l /sys/devices/cpum_cf/events/ | grep AES
+ #
+ If the output is empty than this patch is required.
+ The output should be:
+ # ls /sys/devices/cpum_cf/events/ | grep AES
+ AES_BLOCKED_CYCLES
+ AES_BLOCKED_FUNCTIONS
+ AES_CYCLES
+ AES_FUNCTIONS
+ #
Upstream-ID of fix: f10933cbd2dfddf6273698a45f76db9bafd8150f
** Changed in: linux (Ubuntu Jammy)
Assignee: (unassigned) => Frank Heimes (fheimes)
** Changed in: linux (Ubuntu Noble)
Assignee: (unassigned) => Frank Heimes (fheimes)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2074380
Title:
[UBUNTU 22.04] kernel: s390/cpum_cf: make crypto counters upward
compatible
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2074380/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs