ACK: [SRU X/B/F/G/U] LP: #1908710

Stefan Bader stefan.bader at canonical.com
Thu Jan 14 08:28:13 UTC 2021


On 18.12.20 13:55, Thadeu Lima de Souza Cascardo wrote:
> When sending the fix for CVE-2020-27777, the following regression was
> introduced. It should only affect IBM POWER LPARs, though, and a feature that
> allows testing for failures, named error injection. So, marked as Low.
> 
> [Impact]
> errinjct open fails on IBM POWER LPAR. That prevents error injection
> tests to be performed.
> 
> [Test case]
> Run errinjct open on an LPAR.
> Success case:
> $ sudo errinjct open
> RTAS error injection facility open, token = 1
> Failure case:
> $ sudo errinjct open
> errinjct: Could not open RTAS error injection facility
> 
> errinjct: librtas: open: Unexpected I/O error
> 
> [Fix]
> Typo in RTAS filters.
> 
> [Regression potential]
> errinjct could still be broken, or other RTAS operations could break,
> which could even prevent booting on any IBM POWER systems.
> 
> 
> 
Acked-by: Stefan Bader <stefan.bader at canonical.com>

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20210114/ed613a8e/attachment-0001.sig>


More information about the kernel-team mailing list