APPLIED: [SRU X/B/F/G/U] LP: #1908710

Kelsey Skunberg kelsey.skunberg at canonical.com
Fri Jan 22 04:03:09 UTC 2021


This was already in B/F/G from an upstream patch set, though applied to
xenial/master-next. thank you! 

-Kelsey

On 2020-12-18 09:55:57 , Thadeu Lima de Souza Cascardo wrote:
> When sending the fix for CVE-2020-27777, the following regression was
> introduced. It should only affect IBM POWER LPARs, though, and a feature that
> allows testing for failures, named error injection. So, marked as Low.
> 
> [Impact]
> errinjct open fails on IBM POWER LPAR. That prevents error injection
> tests to be performed.
> 
> [Test case]
> Run errinjct open on an LPAR.
> Success case:
> $ sudo errinjct open
> RTAS error injection facility open, token = 1
> Failure case:
> $ sudo errinjct open
> errinjct: Could not open RTAS error injection facility
> 
> errinjct: librtas: open: Unexpected I/O error
> 
> [Fix]
> Typo in RTAS filters.
> 
> [Regression potential]
> errinjct could still be broken, or other RTAS operations could break,
> which could even prevent booting on any IBM POWER systems.
> 
> 
> 
> -- 
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team



More information about the kernel-team mailing list