[23.04 FEAT] zcrypt DD: AP command filtering

Bug #2003637 reported by bugproxy
16
This bug affects 2 people
Affects Status Importance Assigned to Milestone
Ubuntu on IBM z Systems
Fix Released
High
Skipper Bug Screeners
linux (Ubuntu)
Fix Released
High
Canonical Kernel Team

Bug Description

Feature Description:

Support Stateless AP Commands.
This will mainly affect error processing and recognizing new error types.

bugproxy (bugproxy)
tags: added: architecture-s39064 bugnameltc-201337 severity-high targetmilestone-inin2304
Changed in ubuntu:
assignee: nobody → Skipper Bug Screeners (skipper-screen-team)
affects: ubuntu → linux (Ubuntu)
Frank Heimes (fheimes)
Changed in ubuntu-z-systems:
assignee: nobody → Skipper Bug Screeners (skipper-screen-team)
importance: Undecided → High
Changed in linux (Ubuntu):
importance: Undecided → High
status: New → Incomplete
Changed in ubuntu-z-systems:
status: New → Incomplete
Revision history for this message
Frank Heimes (fheimes) wrote :

Do any kernel commits already exist for this?

Revision history for this message
bugproxy (bugproxy) wrote : Comment bridged from LTC Bugzilla

------- Comment From <email address hidden> 2023-02-21 05:13 EDT-------
@Frank: The commits are not yet available, but we expect them in time for the kernel FF in March

Revision history for this message
bugproxy (bugproxy) wrote :

------- Comment From <email address hidden> 2023-02-22 03:13 EDT-------
The 'fix' is available on the s390 feature branch already:

https://git.kernel.org/pub/scm/linux/kernel/git/s390/linux.git/commit/?h=features&id=ad0faae6ceab7d138dddf9a58eab7151c519e0d3

and if you have a look into this - it is a petty change within a struct exposed to userspace. This feature bug is more for tracking than a real code change.

Revision history for this message
Frank Heimes (fheimes) wrote :

I see: "s390/zcrypt: introduce ctfm field in struct CPRBX" it's really pretty manageable.
I'll just wait until 6.3 is opened and it (probably) lands there.
We still have a bit time until Kernel feature freeze.
I'll make sure to have it in in-time.

Changed in ubuntu-z-systems:
status: Incomplete → New
Changed in linux (Ubuntu):
status: Incomplete → New
Revision history for this message
Frank Heimes (fheimes) wrote :

Fix is in 'linux-next' since next-20230216.

Revision history for this message
Frank Heimes (fheimes) wrote :

Patch request submitted:
https://lists.ubuntu.com/archives/kernel-team/2023-February/thread.html#137396
Updating status to 'In Progress'.

In addition test builds in PPA were done for all major architectures with the unstable kernel
that incl. the patches mentioned above.
https://launchpad.net/~fheimes/+archive/ubuntu/lp2003637

Changed in ubuntu-z-systems:
status: New → In Progress
Changed in linux (Ubuntu):
status: New → In Progress
assignee: Skipper Bug Screeners (skipper-screen-team) → Canonical Kernel Team (canonical-kernel-team)
information type: Private → Public
Revision history for this message
Frank Heimes (fheimes) wrote :

APPLIED - so updating status to 'Fix Committed'

Changed in linux (Ubuntu):
status: In Progress → Fix Committed
Changed in ubuntu-z-systems:
status: In Progress → Fix Committed
Revision history for this message
Frank Heimes (fheimes) wrote :

Target kernel 6.2 just landed in lunar-proposed.

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux - 6.2.0-18.18

---------------
linux (6.2.0-18.18) lunar; urgency=medium

  * lunar/linux: 6.2.0-18.18 -proposed tracker (LP: #2011750)

  * lunar/linux 6.2 fails to boot on arm64 (LP: #2011748)
    - SAUCE: Revert "efi: random: fix NULL-deref when refreshing seed"
    - SAUCE: Revert "efi: random: refresh non-volatile random seed when RNG is
      initialized"

 -- Andrea Righi <email address hidden> Wed, 15 Mar 2023 23:54:18 +0100

Changed in linux (Ubuntu):
status: Fix Committed → Fix Released
Frank Heimes (fheimes)
Changed in ubuntu-z-systems:
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.