2013-10-23 10:20:24 |
Lars Düsing |
bug |
|
|
added bug |
2013-10-23 10:30:11 |
Brad Figg |
linux (Ubuntu): status |
New |
Confirmed |
|
2013-10-23 18:12:47 |
Tyler Hicks |
linux (Ubuntu): importance |
Undecided |
Critical |
|
2013-10-23 18:12:47 |
Tyler Hicks |
linux (Ubuntu): assignee |
|
Tyler Hicks (tyhicks) |
|
2013-10-23 18:12:55 |
Joseph Salisbury |
linux (Ubuntu): importance |
Critical |
Medium |
|
2013-10-23 18:12:57 |
Joseph Salisbury |
linux (Ubuntu): status |
Confirmed |
Incomplete |
|
2013-10-23 18:13:19 |
Joseph Salisbury |
linux (Ubuntu): importance |
Medium |
High |
|
2013-10-23 18:13:24 |
Tyler Hicks |
bug task added |
|
ecryptfs |
|
2013-10-23 18:14:15 |
Tyler Hicks |
tags |
apport-bug i386 saucy |
apport-bug i386 kernel-bug-exists-upstream saucy |
|
2013-10-23 18:14:21 |
Tyler Hicks |
ecryptfs: status |
New |
Triaged |
|
2013-10-23 18:14:23 |
Tyler Hicks |
linux (Ubuntu): status |
Incomplete |
Triaged |
|
2013-10-23 18:14:27 |
Tyler Hicks |
ecryptfs: importance |
Undecided |
Critical |
|
2013-10-23 18:14:31 |
Tyler Hicks |
ecryptfs: assignee |
|
Tyler Hicks (tyhicks) |
|
2013-10-23 18:19:57 |
Joseph Salisbury |
linux (Ubuntu): importance |
High |
Critical |
|
2013-10-23 18:20:10 |
Joseph Salisbury |
tags |
apport-bug i386 kernel-bug-exists-upstream saucy |
apport-bug i386 kernel-bug-exists-upstream kernel-da-key saucy |
|
2013-10-24 00:49:25 |
Joseph Salisbury |
tags |
apport-bug i386 kernel-bug-exists-upstream kernel-da-key saucy |
apport-bug i386 kernel-bug-exists-upstream kernel-key saucy |
|
2013-10-24 07:03:00 |
Tyler Hicks |
summary |
ecryptfs currupts files over 4GB size |
ecryptfs currupts files over 4GB size on i686 |
|
2013-10-24 07:03:09 |
Tyler Hicks |
ecryptfs: status |
Triaged |
In Progress |
|
2013-10-24 07:03:12 |
Tyler Hicks |
linux (Ubuntu): status |
Triaged |
In Progress |
|
2013-10-24 13:49:03 |
Colin Ian King |
attachment added |
|
32-bit-fixes.diff https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1243636/+attachment/3889738/+files/32-bit-fixes.diff |
|
2013-10-24 14:29:47 |
Colin Ian King |
attachment added |
|
potential fix https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1243636/+attachment/3889786/+files/0001-eCryptfs-fix-32-bit-corruption-issue-LP-1243636.patch |
|
2013-10-24 15:31:10 |
Joseph Salisbury |
tags |
apport-bug i386 kernel-bug-exists-upstream kernel-key saucy |
apport-bug i386 kernel-bug-exists-upstream kernel-key saucy tasty |
|
2013-10-24 16:19:26 |
Ubuntu Foundations Team Bug Bot |
tags |
apport-bug i386 kernel-bug-exists-upstream kernel-key saucy tasty |
apport-bug i386 kernel-bug-exists-upstream kernel-key patch saucy tasty |
|
2013-10-24 16:19:28 |
Ubuntu Foundations Team Bug Bot |
bug |
|
|
added subscriber Joseph Salisbury |
2013-10-24 23:18:27 |
Tyler Hicks |
description |
on extracting files with extracted size >4 GB files are getting currupted.
interestingly file gets currupted in the very moment the file size gets more than 4GB.
ProblemType: Bug
DistroRelease: Ubuntu 13.10
Package: linux-image-3.11.0-12-generic 3.11.0-12.19
ProcVersionSignature: Ubuntu 3.11.0-12.19-generic 3.11.3
Uname: Linux 3.11.0-12-generic i686
ApportVersion: 2.12.5-0ubuntu2
Architecture: i386
Date: Wed Oct 23 12:11:43 2013
EcryptfsInUse: Yes
InstallationDate: Installed on 2013-07-20 (94 days ago)
InstallationMedia: Ubuntu 13.04 "Raring Ringtail" - Release i386 (20130424)
MarkForUpload: True
ProcEnviron:
TERM=xterm
PATH=(custom, no user)
XDG_RUNTIME_DIR=<set>
LANG=de_DE.UTF-8
SHELL=/bin/bash
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.11.0-12-generic root=UUID=e97431f7-60b7-4fbe-b22f-5ca3304f2d50 ro quiet splash vt.handoff=7
SourcePackage: linux
UpgradeStatus: Upgraded to saucy on 2013-09-08 (45 days ago) |
[SRU Justification]
Commit 24d15266bd86b7961f309a962fa3aa177a78c49f introduced a data corruption
regression on 32 bit architectures when writing past the 4 GB.
[Impact]
32 bit users experience corruption of large files.
[Fix]
A cast is needed when shifting the page's index. Colin and I independently
identified the problem. It is a simple fix that is currently located in the
eCryptfs next branch:
http://git.kernel.org/cgit/linux/kernel/git/tyhicks/ecryptfs.git/commit/?h=next&id=43b7c6c6a4e3916edd186ceb61be0c67d1e0969e
I've sent a pull request to Linus, but he has not yet had a chance to pull in
the change:
https://lkml.org/lkml/2013/10/24/424
[Test Case]
Inside of an eCryptfs mount on an i686 Ubuntu install, create a file containing
4 GB + 1 page worth (4096 bytes) of zeros. Then inspect the file for non-zero
bytes.
$ rm zeros
$ dd if=/dev/zero of=zeros bs=4096 count=$((4*1024*1024*1024/4096+4096))
1052672+0 records in
1052672+0 records out
4311744512 bytes (4.3 GB) copied, 226.133 s, 19.1 MB/s
$ hexdump -C zeros
00000000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
101000000
The hexdump output should show all zeros. A non patched kernel will show
non-zero bytes.
[Original Bug Report]
on extracting files with extracted size >4 GB files are getting currupted.
interestingly file gets currupted in the very moment the file size gets more than 4GB.
ProblemType: Bug
DistroRelease: Ubuntu 13.10
Package: linux-image-3.11.0-12-generic 3.11.0-12.19
ProcVersionSignature: Ubuntu 3.11.0-12.19-generic 3.11.3
Uname: Linux 3.11.0-12-generic i686
ApportVersion: 2.12.5-0ubuntu2
Architecture: i386
Date: Wed Oct 23 12:11:43 2013
EcryptfsInUse: Yes
InstallationDate: Installed on 2013-07-20 (94 days ago)
InstallationMedia: Ubuntu 13.04 "Raring Ringtail" - Release i386 (20130424)
MarkForUpload: True
ProcEnviron:
TERM=xterm
PATH=(custom, no user)
XDG_RUNTIME_DIR=<set>
LANG=de_DE.UTF-8
SHELL=/bin/bash
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.11.0-12-generic root=UUID=e97431f7-60b7-4fbe-b22f-5ca3304f2d50 ro quiet splash vt.handoff=7
SourcePackage: linux
UpgradeStatus: Upgraded to saucy on 2013-09-08 (45 days ago) |
|
2013-10-25 14:18:21 |
Colin Ian King |
summary |
ecryptfs currupts files over 4GB size on i686 |
ecryptfs corrupts files over 4GB size on i686 |
|
2013-10-25 16:11:17 |
Tyler Hicks |
description |
[SRU Justification]
Commit 24d15266bd86b7961f309a962fa3aa177a78c49f introduced a data corruption
regression on 32 bit architectures when writing past the 4 GB.
[Impact]
32 bit users experience corruption of large files.
[Fix]
A cast is needed when shifting the page's index. Colin and I independently
identified the problem. It is a simple fix that is currently located in the
eCryptfs next branch:
http://git.kernel.org/cgit/linux/kernel/git/tyhicks/ecryptfs.git/commit/?h=next&id=43b7c6c6a4e3916edd186ceb61be0c67d1e0969e
I've sent a pull request to Linus, but he has not yet had a chance to pull in
the change:
https://lkml.org/lkml/2013/10/24/424
[Test Case]
Inside of an eCryptfs mount on an i686 Ubuntu install, create a file containing
4 GB + 1 page worth (4096 bytes) of zeros. Then inspect the file for non-zero
bytes.
$ rm zeros
$ dd if=/dev/zero of=zeros bs=4096 count=$((4*1024*1024*1024/4096+4096))
1052672+0 records in
1052672+0 records out
4311744512 bytes (4.3 GB) copied, 226.133 s, 19.1 MB/s
$ hexdump -C zeros
00000000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
101000000
The hexdump output should show all zeros. A non patched kernel will show
non-zero bytes.
[Original Bug Report]
on extracting files with extracted size >4 GB files are getting currupted.
interestingly file gets currupted in the very moment the file size gets more than 4GB.
ProblemType: Bug
DistroRelease: Ubuntu 13.10
Package: linux-image-3.11.0-12-generic 3.11.0-12.19
ProcVersionSignature: Ubuntu 3.11.0-12.19-generic 3.11.3
Uname: Linux 3.11.0-12-generic i686
ApportVersion: 2.12.5-0ubuntu2
Architecture: i386
Date: Wed Oct 23 12:11:43 2013
EcryptfsInUse: Yes
InstallationDate: Installed on 2013-07-20 (94 days ago)
InstallationMedia: Ubuntu 13.04 "Raring Ringtail" - Release i386 (20130424)
MarkForUpload: True
ProcEnviron:
TERM=xterm
PATH=(custom, no user)
XDG_RUNTIME_DIR=<set>
LANG=de_DE.UTF-8
SHELL=/bin/bash
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.11.0-12-generic root=UUID=e97431f7-60b7-4fbe-b22f-5ca3304f2d50 ro quiet splash vt.handoff=7
SourcePackage: linux
UpgradeStatus: Upgraded to saucy on 2013-09-08 (45 days ago) |
[SRU Justification]
Commit 24d15266bd86b7961f309a962fa3aa177a78c49f introduced a data corruption
regression on 32 bit architectures when writing past the 4 GB.
[Impact]
32 bit users experience corruption of large files.
[Fix]
A cast is needed when shifting the page's index. Colin and I independently
identified the problem. It is a simple fix that has been merged upstream:
http://git.kernel.org/linus/43b7c6c6a4e3916edd186ceb61be0c67d1e0969e
[Test Case]
Inside of an eCryptfs mount on an i686 Ubuntu install, create a file containing
4 GB + 1 page worth (4096 bytes) of zeros. Then inspect the file for non-zero
bytes.
$ rm zeros
$ dd if=/dev/zero of=zeros bs=4096 count=$((4*1024*1024*1024/4096+4096))
1052672+0 records in
1052672+0 records out
4311744512 bytes (4.3 GB) copied, 226.133 s, 19.1 MB/s
$ hexdump -C zeros
00000000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
*
101000000
The hexdump output should show all zeros. A non patched kernel will show
non-zero bytes.
[Original Bug Report]
on extracting files with extracted size >4 GB files are getting currupted.
interestingly file gets currupted in the very moment the file size gets more than 4GB.
ProblemType: Bug
DistroRelease: Ubuntu 13.10
Package: linux-image-3.11.0-12-generic 3.11.0-12.19
ProcVersionSignature: Ubuntu 3.11.0-12.19-generic 3.11.3
Uname: Linux 3.11.0-12-generic i686
ApportVersion: 2.12.5-0ubuntu2
Architecture: i386
Date: Wed Oct 23 12:11:43 2013
EcryptfsInUse: Yes
InstallationDate: Installed on 2013-07-20 (94 days ago)
InstallationMedia: Ubuntu 13.04 "Raring Ringtail" - Release i386 (20130424)
MarkForUpload: True
ProcEnviron:
TERM=xterm
PATH=(custom, no user)
XDG_RUNTIME_DIR=<set>
LANG=de_DE.UTF-8
SHELL=/bin/bash
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.11.0-12-generic root=UUID=e97431f7-60b7-4fbe-b22f-5ca3304f2d50 ro quiet splash vt.handoff=7
SourcePackage: linux
UpgradeStatus: Upgraded to saucy on 2013-09-08 (45 days ago) |
|
2013-10-25 16:11:22 |
Tyler Hicks |
ecryptfs: status |
In Progress |
Fix Committed |
|
2013-10-28 23:01:15 |
striscio |
bug |
|
|
added subscriber striscio |
2013-11-12 17:29:21 |
Joseph Salisbury |
tags |
apport-bug i386 kernel-bug-exists-upstream kernel-key patch saucy tasty |
apport-bug i386 kernel-bug-exists-upstream patch saucy tasty |
|
2013-11-14 10:32:03 |
Launchpad Janitor |
branch linked |
|
lp:ubuntu/precise-proposed/linux-lts-saucy |
|
2013-11-14 16:36:58 |
Brad Figg |
linux (Ubuntu): status |
In Progress |
Fix Committed |
|
2013-11-18 02:14:50 |
Brad Figg |
tags |
apport-bug i386 kernel-bug-exists-upstream patch saucy tasty |
apport-bug i386 kernel-bug-exists-upstream patch saucy tasty verification-needed-saucy |
|
2013-11-18 14:58:59 |
Lars Düsing |
tags |
apport-bug i386 kernel-bug-exists-upstream patch saucy tasty verification-needed-saucy |
apport-bug i386 kernel-bug-exists-upstream patch saucy tasty verification-done-saucy |
|
2013-11-20 08:23:03 |
Launchpad Janitor |
branch linked |
|
lp:ubuntu/saucy-proposed/linux-exynos5 |
|
2013-12-03 01:28:13 |
Launchpad Janitor |
linux (Ubuntu): status |
Fix Committed |
Fix Released |
|
2013-12-03 01:28:13 |
Launchpad Janitor |
cve linked |
|
2013-4299 |
|
2015-03-11 15:42:43 |
Dustin Kirkland |
ecryptfs: status |
Fix Committed |
Fix Released |
|