s390/cio: update measurement characteristics

Bug #1541534 reported by bugproxy
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Fix Released
Medium
Tim Gardner
Xenial
Fix Released
Medium
Tim Gardner

Bug Description

Description: s390/cio: update measurement characteristics
Symptom: lschp shows stale information in the "Cmg" and "Shared"
              column.
Problem: Measurement characteristics are read only during IPL
              and are not updated when capabilities of a chpid change.
Solution: Keep measurement characteristics up to date.
Reproduction: chchp -c 1 <chpid> ; lschp
Upstream-ID: 0d9bfe9123cfde59bf5c2e375b59d2a7d5061c4c
              61f0bfcf8020f02eb09adaef96745d1c1d1b3623
              9f3d6d7a40a178b8a5b5274f4e55fec8c30147c9

Please integrate the following upstream commit IDs into the Ubuntu kernel:

commit 0d9bfe9123cfde59bf5c2e375b59d2a7d5061c4c
Author: Sebastian Ott <email address hidden>
Date: Mon Jan 25 10:30:27 2016 +0100

    s390/cio: fix measurement characteristics memleak

    Measurement characteristics are allocated during channel path
    registration but not freed during deregistration. Fix this by
    embedding these characteristics inside struct channel_path.

    Signed-off-by: Sebastian Ott <email address hidden>
    Reviewed-by: Peter Oberparleiter <email address hidden>
    Signed-off-by: Martin Schwidefsky <email address hidden>

commit 61f0bfcf8020f02eb09adaef96745d1c1d1b3623
Author: Sebastian Ott <email address hidden>
Date: Mon Jan 25 10:31:33 2016 +0100

    s390/cio: ensure consistent measurement state

    Make sure that in all cases where we could not obtain measurement
    characteristics the associated fields are set to invalid values.

    Note: without this change the "shared" capability of a channel path
    for which we could not obtain the measurement characteristics was
    incorrectly displayed as 0 (not shared). We will now correctly
    report "unknown" in this case.

    Signed-off-by: Sebastian Ott <email address hidden>
    Reviewed-by: Peter Oberparleiter <email address hidden>
    Signed-off-by: Martin Schwidefsky <email address hidden>

commit 9f3d6d7a40a178b8a5b5274f4e55fec8c30147c9
Author: Sebastian Ott <email address hidden>
Date: Mon Jan 25 10:32:51 2016 +0100

    s390/cio: update measurement characteristics

    Per channel path measurement characteristics are obtained during channel
    path registration. However if some properties of a channel path change
    we don't update the measurement characteristics.

    Make sure to update the characteristics when we change the properties of
    a channel path or receive a notification from FW about such a change.

    Signed-off-by: Sebastian Ott <email address hidden>
    Reviewed-by: Peter Oberparleiter <email address hidden>
    Signed-off-by: Martin Schwidefsky <email address hidden>

Revision history for this message
Ubuntu Foundations Team Bug Bot (crichton) wrote :

Thank you for taking the time to report this bug and helping to make Ubuntu better. It seems that your bug report is not filed about a specific source package though, rather it is just filed against Ubuntu in general. It is important that bug reports be filed about source packages so that people interested in the package can find the bugs about it. You can find some hints about determining what package your bug might be about at https://wiki.ubuntu.com/Bugs/FindRightPackage. You might also ask for help in the #ubuntu-bugs irc channel on Freenode.

To change the source package that this bug is filed about visit https://bugs.launchpad.net/ubuntu/+bug/1541534/+editstatus and add the package name in the text box next to the word Package.

[This is an automated message. I apologize if it reached you inappropriately; please just reply to this message indicating so.]

tags: added: bot-comment
bugproxy (bugproxy)
tags: added: architecture-s39064 bugnameltc-136515 severity-medium targetmilestone-inin1604
Luciano Chavez (lnx1138)
affects: ubuntu → linux (Ubuntu)
Tim Gardner (timg-tpi)
Changed in linux (Ubuntu Xenial):
assignee: nobody → Tim Gardner (timg-tpi)
status: New → Fix Committed
penalvch (penalvch)
Changed in linux (Ubuntu Xenial):
importance: Undecided → Medium
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (3.4 KiB)

This bug was fixed in the package linux - 4.4.0-6.21

---------------
linux (4.4.0-6.21) xenial; urgency=low

  [ Tim Gardner ]

  * Release Tracking Bug
    - LP: #1546283

  * Naples/Zen, NTB Driver (LP: #1542071)
    - [Config] CONFIG_NTB_AMD=m
    - NTB: Add support for AMD PCI-Express Non-Transparent Bridge

  * [Hyper-V] kernel panic occurs when installing Ubuntu Server x32 (LP: #1495983)
    - SAUCE: storvsc: use small sg_tablesize on x86

  * Enable arm64 emulation of removed ARMv7 instructions (LP: #1545542)
    - [Config] CONFIG_ARMV8_DEPRECATED=y

  * Surelock-GA2:kernel panic/ exception @ pcibios_set_pcie_reset_state+0x118/0x280 + cxl_reset+0x5c/0xc0 (LP: #1545037)
    - powerpc/eeh: Fix stale cached primary bus

  * Miscellaneous Ubuntu changes
    - SAUCE: fs: Add user namesapace member to struct super_block
    - SAUCE: fs: Limit file caps to the user namespace of the super block
    - SAUCE: Smack: Add support for unprivileged mounts from user namespaces
    - SAUCE: block_dev: Support checking inode permissions in lookup_bdev()
    - SAUCE: block_dev: Check permissions towards block device inode when mounting
    - SAUCE: fs: Treat foreign mounts as nosuid
    - SAUCE: selinux: Add support for unprivileged mounts from user namespaces
    - SAUCE: userns: Replace in_userns with current_in_userns
    - SAUCE: Smack: Handle labels consistently in untrusted mounts
    - SAUCE: fs: Check for invalid i_uid in may_follow_link()
    - SAUCE: cred: Reject inodes with invalid ids in set_create_file_as()
    - SAUCE: fs: Refuse uid/gid changes which don't map into s_user_ns
    - SAUCE: fs: Update posix_acl support to handle user namespace mounts
    - SAUCE: fs: Ensure the mounter of a filesystem is privileged towards its inodes
    - SAUCE: fs: Don't remove suid for CAP_FSETID in s_user_ns
    - SAUCE: fs: Allow superblock owner to access do_remount_sb()
    - SAUCE: capabilities: Allow privileged user in s_user_ns to set security.* xattrs
    - SAUCE: fuse: Add support for pid namespaces
    - SAUCE: fuse: Support fuse filesystems outside of init_user_ns
    - SAUCE: fuse: Restrict allow_other to the superblock's namespace or a descendant
    - SAUCE: fuse: Allow user namespace mounts
    - SAUCE: mtd: Check permissions towards mtd block device inode when mounting
    - SAUCE: fs: Update i_[ug]id_(read|write) to translate relative to s_user_ns
    - SAUCE: quota: Convert ids relative to s_user_ns
    - SAUCE: evm: Translate user/group ids relative to s_user_ns when computing HMAC
    - SAUCE: fs: Allow CAP_SYS_ADMIN in s_user_ns to freeze and thaw filesystems
    - SAUCE: quota: Treat superblock owner as privilged
    - SAUCE: ima/evm: Allow root in s_user_ns to set xattrs
    - SAUCE: block_dev: Forbid unprivileged mounting when device is opened for writing
    - SAUCE: ext4: Add support for unprivileged mounts from user namespaces
    - SAUCE: ext4: Add module parameter to enable user namespace mounts
    - SAUCE: fuse: Add module parameter to enable user namespace mounts

  * Miscellaneous upstream changes
    - megaraid: Fix possible NULL pointer deference in mraid_mm_ioctl
    - libahci: Implement the capability to override th...

Read more...

Changed in linux (Ubuntu Xenial):
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.