-
Notifications
You must be signed in to change notification settings - Fork 105
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RHCOS 4.11 + RHEL 8.6 s390x: Failed systemd-modules-load.service #752
Comments
Does fwupd do anything on s390x? Should we just not be installing it at all? |
I asked around since i don't have that deep of a system knowledge myself. So installing fwupd on s390x seems questionable. The only thing that came up is vBMC in OpenStack and libvirt using IPMI, but this would be running on a kvm Host and i don't think we need that capability in CoreOS currently. |
Short term I'm fine carrying a postprocess script which drops out the incorrect module loads on s390x too. |
@cgwalters I could run RHCOS without fwupd with no problems, so i'll try it with fcos as well and if it works my plan is to not install it on s390x. I don't think we need to do this in postprocess |
The fwupd package is not needed on s390x and causes problems in RHCOS. openshift/os#752 Signed-off-by: Jan Schintag <jan.schintag@de.ibm.com>
I suspect this could be done for @mrcxavier could you do some investigation about the usefulness of |
The fwupd package is not needed on s390x and causes problems in RHCOS. openshift/os#752 Signed-off-by: Jan Schintag <jan.schintag@de.ibm.com>
The fwupd package is not needed on s390x and causes problems in RHCOS. openshift/os#752 Signed-off-by: Jan Schintag <jan.schintag@de.ibm.com>
Fixes: openshift#752 Pick up 4cae1d0 to fix the failing systemd-modules-load.service on s390x ``` Benjamin Gilbert (2): image-base: specify VMware OS and HW versions workflows: update check-diff location Colin Walters (3): buildroot: Install `clang-tools-extra` manifest: Add `container-cmd` manifests: Move `container-cmd` to `user-experience.yaml` CoreOS Bot (18): overrides: fast-track rpm-ostree-2022.5-1.fc35 lockfiles: bump to latest lockfiles: bump to latest lockfiles: bump to latest lockfiles: bump to latest lockfiles: bump to latest lockfiles: drop graduated overrides 🎓 lockfiles: bump to latest lockfiles: bump to latest lockfiles: bump to latest overrides: fast-track kernel-5.16.15-201.fc35 lockfiles: bump to latest lockfiles: bump to latest lockfiles: drop graduated overrides 🎓 lockfiles: bump to latest lockfiles: bump to latest overrides: fast-track rust-coreos-installer-0.13.1-3.fc35 lockfiles: bump to latest Dusty Mabe (20): denylist: drop ostree.hotfix denial shared-workarounds: adjust service fix to not apply to F37+ denylist: make boot-mirror denials apply to the main test denylist: drop snooze for ext.config.podman.dns denylist: extend snooze's for tests that are still failing manifests: apply podman-v4.yaml manifest on F36+ overrides: drop kernel pin denylist: extend snooze for multipath.day1 tests: update documentation in podman.dns test tests: extend timeout for podman.dns test denylist: snooze the detection of the journald fix overrides: fast-track kernel-5.16.13-200.fc35 denylist: drop ext.config.extensions.module snooze denylist: extend snoozes for tests that are still failing denylist: drop denial for coreos.boot-mirror.luks on rawhide/branched manifests/fedora-coreos-base: mask systemd-network-generator.service tests: limit host bound package layer to specific streams manifests: fedora-coreos-base: add containernetworking-plugins explicitly denylist: extend snooze for journald fix test overlay: 40ignition-ostree: make ignition-ostree-transposefs tolerant to debug kernels Huijing Hei (1): networking: veirfy rd.net.timeout.dhcp and rd.net.dhcp.retry are supported by NetworkManager. Jan Schintag (3): s390x: Do not install fwupd package s390x: Do not run ext.config.networking.kargs-rd-net test tests/kola/networking: Update tests with description of kola arguments Jonathan Lebon (9): manifests: make `releasever` a number manifests: add iptables-nft.yaml for f36+ manifests: move zincati/pinger disablement to overlay.d manifests: delete redundant rojig definition manifests: lower all templatable fields to shared manifest workflows/remove-graduated-overrides: enable continuous repo manifests/system-configuration: add `acl` manifest: explicitly list containerd overlay/05core: ship by-id/coreos-boot-disk udev rule in initrd only Nikita Dubrovskii (1): Revert "overlay: verify filesystem labeled 'boot' is unique after ignition" Ryan Jenkins (1): denylist: drop `ext.config.toolbox` denial Sohan Kunkerkar (1): overrides: fast-track Ignition 2.13.0-5.fc35 ``` Signed-off-by: Jan Schintag <jan.schintag@de.ibm.com>
The fwupd package is not needed on s390x and causes problems in RHCOS. openshift/os#752 Signed-off-by: Jan Schintag <jan.schintag@de.ibm.com>
The fwupd package is not needed on s390x and causes problems in RHCOS. openshift/os#752 Signed-off-by: Jan Schintag <jan.schintag@de.ibm.com>
When testing rhcos 4.11 based on RHEL 8.6 on s390x, i can see when booting the image, that the
systemd-modules-load.service
fails.The Image passed the kola tests.
At login:
The Problem seems to be that the package fwupd is trying to load them:
The text was updated successfully, but these errors were encountered: