Forums before death by AOL, social media and spammers... "We can't have nice things"
|    linux.debian.bugs.dist    |    Ohh some weird Debian bug report thing    |    28,835 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 28,175 of 28,835    |
|    Drew Parsons to All    |
|    Bug#1126688: openblas causes slepc4py te    |
|    19 Feb 26 12:30:01    |
      XPost: linux.debian.ports.powerpc       From: dparsons@debian.org              Source: openblas       Version: 0.3.31+ds-3       Followup-For: Bug #1126688       X-Debbugs-Cc: debian-powerpc@lists.debian.org       User: debian-powerpc@lists.debian.org       Usertags: ppc64el              For information, the failing ppc64el machine is (lscpu)              383s Architecture: ppc64le       383s Byte Order: Little Endian       383s CPU(s): 16       383s On-line CPU(s) list: 0-15       383s Model name: POWER10 (architected), altivec       supported       383s Model: 2.0 (pvr 0080 0200)       383s Thread(s) per core: 1       383s Core(s) per socket: 1       383s Socket(s): 16       383s Hypervisor vendor: KVM       383s Virtualization type: para       383s L1d cache: 512 KiB (16 instances)       383s L1i cache: 768 KiB (16 instances)       383s NUMA node(s): 1       383s NUMA node0 CPU(s): 0-15       383s Vulnerability Gather data sampling: Not affected       383s Vulnerability Indirect target selection: Not affected       383s Vulnerability Itlb multihit: Not affected       383s Vulnerability L1tf: Mitigation; RFI Flush, L1D       private per thread       383s Vulnerability Mds: Not affected       383s Vulnerability Meltdown: Mitigation; RFI Flush, L1D       private per thread       383s Vulnerability Mmio stale data: Not affected       383s Vulnerability Reg file data sampling: Not affected       383s Vulnerability Retbleed: Not affected       383s Vulnerability Spec rstack overflow: Not affected       383s Vulnerability Spec store bypass: Mitigation; Kernel entry/exit       barrier (eieio)       383s Vulnerability Spectre v1: Mitigation; __user pointer       sanitization, ori31 speculation barrier enabled       383s Vulnerability Spectre v2: Mitigation; Software count cache       flush (hardware accelerated), Software link stack flush       383s Vulnerability Srbds: Not affected       383s Vulnerability Tsa: Not affected       383s Vulnerability Tsx async abort: Not affected       383s Vulnerability Vmscape: Not affected              using openblas-pthread for liblapack.so       383s lrwxrwxrwx 1 root root 52 Jan 24 00:03 /usr/lib/powerpc64le       linux-gnu/liblapack.so -> /etc/alternatives/liblapack.so-powerpc64le-linux-gnu       383s lrwxrwxrwx 1 root root 54 Jan 24 00:03 /usr/lib/powerpc64le       linux-gnu/liblapack.so.3 -> /etc/alternatives/liblapack.so.3-pow       rpc64le-linux-gnu       383s lrwxrwxrwx 1 root root 60 Feb 17 20:15 /etc/alternatives/li       lapack.so-powerpc64le-linux-gnu -> /usr/lib/powerpc64le-linux-gn       /openblas-pthread/liblapack.so       383s lrwxrwxrwx 1 root root 62 Feb 17 20:15 /etc/alternatives/li       lapack.so.3-powerpc64le-linux-gnu -> /usr/lib/powerpc64le-linux-       nu/openblas-pthread/liblapack.so.3              Logged at       https://ci.debian.net/packages/s/slepc4py/unstable/ppc64el/68748036/       https://ci.debian.net/data/autopkgtest/unstable/ppc64el/s/slepc4       y/68748036/log.gz              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca