| Summary: | cio: prevent purging of CCW devices in the online state | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 6 | Reporter: | IBM Bug Proxy <bugproxy> | ||||
| Component: | kernel | Assignee: | Hendrik Brueckner <brueckner> | ||||
| Status: | CLOSED ERRATA | QA Contact: | Red Hat Kernel QE team <kernel-qe> | ||||
| Severity: | medium | Docs Contact: | |||||
| Priority: | medium | ||||||
| Version: | 6.0 | CC: | balkov, brueckner, eguan, jkachuck, kzhang, pbenas, peterm, syeghiay | ||||
| Target Milestone: | rc | Keywords: | OtherQA | ||||
| Target Release: | --- | ||||||
| Hardware: | s390x | ||||||
| OS: | All | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | kernel-2.6.32-170.el6 | Doc Type: | Bug Fix | ||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2011-12-06 12:57:07 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Bug Depends On: | |||||||
| Bug Blocks: | 684953 | ||||||
| Attachments: |
|
||||||
Created attachment 491248 [details]
linux-2.6.32-s390-cio-prevent-online-purge.patch
The patch has been posted to rhkernel by Hendrik Brueckner <brueckner> This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux maintenance release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux Update release for currently deployed products. This request is not yet committed for inclusion in an Update release. Patch(es) available on kernel-2.6.32-170.el6 ------- Comment From hari.ibm.com 2011-11-02 01:26 EDT------- Tested on RHEL 6.2 [root@r1713003 ~]# uname -a Linux r1713003 2.6.32-207.el6.s390x #1 SMP Mon Oct 10 01:56:05 EDT 2011 s390x s390x s390x GNU/Linux [root@r1713003 ~]# cat /etc/issue Red Hat Enterprise Linux Server release 6.2 Beta (Santiago) Kernel \r on an \m [root@r1713003 ~]# echo add 0.0.3407 > /proc/cio_ignore;echo purge > /proc/cio_ignore ; echo 1 > /sys/bus/ccw/drivers/dasd-eckd/0.0.3407/online;lsdasd -bash: echo: write error: Resource temporarily unavailable Bus-ID Status Name Device Type BlkSz Size Blocks ============================================================================== 0.0.3406 active dasda 94:0 ECKD 4096 7043MB 1803060 0.0.3408 active dasdb 94:4 ECKD 4096 7043MB 1803060 The problem is been fixed, hence closing the bugzilla. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHSA-2011-1530.html |
linux-2.6.32-s390-cio-prevent-online-purge.patch Description: cio: prevent purging of CCW devices in the online state Symptom: After the performance of the cio_ignore purge function (cio_ignore --purge or echo purge > /proc/cio_ignore), a device which is in the online state and on the cio_ignore blacklist is removed and no longer accessible. Problem: The cio_ignore purge function should only remove devices which are in the offline state and on the cio_ignore blacklist. If a purge function is performed, devices which are offline and on the blacklist are scheduled for removal. Due to missing checks in the set online function, such a device can still be set online. This can result in a situation where a device is set online and immediately afterwards removed. Solution: When users request that a device be set online which there is delayed work pending for this device, reject the request. Also ensure that no devices which are in the process of being set online are marked for removal during a purge operation. Server architecture(s): System z Server type: s390x General component: kernel Other components involved: No Does the server have the latest GA firmware? Yes. Has the problem been shown to occur on more than one system? Yes. Is a tested patch available? Yes. If yes to the above, has it been approved upstream? http://git.kernel.org/?p=linux/kernel/git/torvalds/linux- 2.6.git;a=commitdiff;h=a2fc8485f838ccd2ce5db690f81ac086489a9e7e What is the latest official Red Hat build on which this bug has been seen? RHEL6 The patch has been tested, fixes the problem, and is part of the upstream kernel. With best regards, Hendrik