Bug#1126688: openblas causes slepc4py test failure on ppc64el: Error in LAPACK subroutine gesvd: info=127

Drew Parsons dparsons at debian.org
Thu Feb 19 11:20:49 GMT 2026


Source: openblas
Version: 0.3.31+ds-3
Followup-For: Bug #1126688
X-Debbugs-Cc: debian-powerpc at lists.debian.org
User: debian-powerpc at lists.debian.org
Usertags: ppc64el

For information, the failing ppc64el machine is (lscpu)

383s Architecture:                            ppc64le
383s Byte Order:                              Little Endian
383s CPU(s):                                  16
383s On-line CPU(s) list:                     0-15
383s Model name:                              POWER10 (architected), altivec supported
383s Model:                                   2.0 (pvr 0080 0200)
383s Thread(s) per core:                      1
383s Core(s) per socket:                      1
383s Socket(s):                               16
383s Hypervisor vendor:                       KVM
383s Virtualization type:                     para
383s L1d cache:                               512 KiB (16 instances)
383s L1i cache:                               768 KiB (16 instances)
383s NUMA node(s):                            1
383s NUMA node0 CPU(s):                       0-15
383s Vulnerability Gather data sampling:      Not affected
383s Vulnerability Indirect target selection: Not affected
383s Vulnerability Itlb multihit:             Not affected
383s Vulnerability L1tf:                      Mitigation; RFI Flush, L1D private per thread
383s Vulnerability Mds:                       Not affected
383s Vulnerability Meltdown:                  Mitigation; RFI Flush, L1D private per thread
383s Vulnerability Mmio stale data:           Not affected
383s Vulnerability Reg file data sampling:    Not affected
383s Vulnerability Retbleed:                  Not affected
383s Vulnerability Spec rstack overflow:      Not affected
383s Vulnerability Spec store bypass:         Mitigation; Kernel entry/exit barrier (eieio)
383s Vulnerability Spectre v1:                Mitigation; __user pointer sanitization, ori31 speculation barrier enabled
383s Vulnerability Spectre v2:                Mitigation; Software count cache flush (hardware accelerated), Software link stack flush
383s Vulnerability Srbds:                     Not affected
383s Vulnerability Tsa:                       Not affected
383s Vulnerability Tsx async abort:           Not affected
383s Vulnerability Vmscape:                   Not affected

using openblas-pthread for liblapack.so
383s lrwxrwxrwx 1 root root 52 Jan 24 00:03 /usr/lib/powerpc64le-linux-gnu/liblapack.so -> /etc/alternatives/liblapack.so-powerpc64le-linux-gnu
383s lrwxrwxrwx 1 root root 54 Jan 24 00:03 /usr/lib/powerpc64le-linux-gnu/liblapack.so.3 -> /etc/alternatives/liblapack.so.3-powerpc64le-linux-gnu
383s lrwxrwxrwx 1 root root 60 Feb 17 20:15 /etc/alternatives/liblapack.so-powerpc64le-linux-gnu -> /usr/lib/powerpc64le-linux-gnu/openblas-pthread/liblapack.so
383s lrwxrwxrwx 1 root root 62 Feb 17 20:15 /etc/alternatives/liblapack.so.3-powerpc64le-linux-gnu -> /usr/lib/powerpc64le-linux-gnu/openblas-pthread/liblapack.so.3

Logged at
https://ci.debian.net/packages/s/slepc4py/unstable/ppc64el/68748036/
https://ci.debian.net/data/autopkgtest/unstable/ppc64el/s/slepc4py/68748036/log.gz



More information about the debian-science-maintainers mailing list