Activity log for bug #1243636

Date Who What changed Old value New value Message
2013-10-23 10:20:24 Lars Düsing bug added bug
2013-10-23 10:30:11 Brad Figg linux (Ubuntu): status New Confirmed
2013-10-23 18:12:47 Tyler Hicks linux (Ubuntu): importance Undecided Critical
2013-10-23 18:12:47 Tyler Hicks linux (Ubuntu): assignee Tyler Hicks (tyhicks)
2013-10-23 18:12:55 Joseph Salisbury linux (Ubuntu): importance Critical Medium
2013-10-23 18:12:57 Joseph Salisbury linux (Ubuntu): status Confirmed Incomplete
2013-10-23 18:13:19 Joseph Salisbury linux (Ubuntu): importance Medium High
2013-10-23 18:13:24 Tyler Hicks bug task added ecryptfs
2013-10-23 18:14:15 Tyler Hicks tags apport-bug i386 saucy apport-bug i386 kernel-bug-exists-upstream saucy
2013-10-23 18:14:21 Tyler Hicks ecryptfs: status New Triaged
2013-10-23 18:14:23 Tyler Hicks linux (Ubuntu): status Incomplete Triaged
2013-10-23 18:14:27 Tyler Hicks ecryptfs: importance Undecided Critical
2013-10-23 18:14:31 Tyler Hicks ecryptfs: assignee Tyler Hicks (tyhicks)
2013-10-23 18:19:57 Joseph Salisbury linux (Ubuntu): importance High Critical
2013-10-23 18:20:10 Joseph Salisbury tags apport-bug i386 kernel-bug-exists-upstream saucy apport-bug i386 kernel-bug-exists-upstream kernel-da-key saucy
2013-10-24 00:49:25 Joseph Salisbury tags apport-bug i386 kernel-bug-exists-upstream kernel-da-key saucy apport-bug i386 kernel-bug-exists-upstream kernel-key saucy
2013-10-24 07:03:00 Tyler Hicks summary ecryptfs currupts files over 4GB size ecryptfs currupts files over 4GB size on i686
2013-10-24 07:03:09 Tyler Hicks ecryptfs: status Triaged In Progress
2013-10-24 07:03:12 Tyler Hicks linux (Ubuntu): status Triaged In Progress
2013-10-24 13:49:03 Colin Ian King attachment added 32-bit-fixes.diff https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1243636/+attachment/3889738/+files/32-bit-fixes.diff
2013-10-24 14:29:47 Colin Ian King attachment added potential fix https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1243636/+attachment/3889786/+files/0001-eCryptfs-fix-32-bit-corruption-issue-LP-1243636.patch
2013-10-24 15:31:10 Joseph Salisbury tags apport-bug i386 kernel-bug-exists-upstream kernel-key saucy apport-bug i386 kernel-bug-exists-upstream kernel-key saucy tasty
2013-10-24 16:19:26 Ubuntu Foundations Team Bug Bot tags apport-bug i386 kernel-bug-exists-upstream kernel-key saucy tasty apport-bug i386 kernel-bug-exists-upstream kernel-key patch saucy tasty
2013-10-24 16:19:28 Ubuntu Foundations Team Bug Bot bug added subscriber Joseph Salisbury
2013-10-24 23:18:27 Tyler Hicks description on extracting files with extracted size >4 GB files are getting currupted. interestingly file gets currupted in the very moment the file size gets more than 4GB. ProblemType: Bug DistroRelease: Ubuntu 13.10 Package: linux-image-3.11.0-12-generic 3.11.0-12.19 ProcVersionSignature: Ubuntu 3.11.0-12.19-generic 3.11.3 Uname: Linux 3.11.0-12-generic i686 ApportVersion: 2.12.5-0ubuntu2 Architecture: i386 Date: Wed Oct 23 12:11:43 2013 EcryptfsInUse: Yes InstallationDate: Installed on 2013-07-20 (94 days ago) InstallationMedia: Ubuntu 13.04 "Raring Ringtail" - Release i386 (20130424) MarkForUpload: True ProcEnviron: TERM=xterm PATH=(custom, no user) XDG_RUNTIME_DIR=<set> LANG=de_DE.UTF-8 SHELL=/bin/bash ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.11.0-12-generic root=UUID=e97431f7-60b7-4fbe-b22f-5ca3304f2d50 ro quiet splash vt.handoff=7 SourcePackage: linux UpgradeStatus: Upgraded to saucy on 2013-09-08 (45 days ago) [SRU Justification] Commit 24d15266bd86b7961f309a962fa3aa177a78c49f introduced a data corruption regression on 32 bit architectures when writing past the 4 GB. [Impact] 32 bit users experience corruption of large files. [Fix] A cast is needed when shifting the page's index. Colin and I independently identified the problem. It is a simple fix that is currently located in the eCryptfs next branch: http://git.kernel.org/cgit/linux/kernel/git/tyhicks/ecryptfs.git/commit/?h=next&id=43b7c6c6a4e3916edd186ceb61be0c67d1e0969e I've sent a pull request to Linus, but he has not yet had a chance to pull in the change: https://lkml.org/lkml/2013/10/24/424 [Test Case] Inside of an eCryptfs mount on an i686 Ubuntu install, create a file containing 4 GB + 1 page worth (4096 bytes) of zeros. Then inspect the file for non-zero bytes. $ rm zeros $ dd if=/dev/zero of=zeros bs=4096 count=$((4*1024*1024*1024/4096+4096)) 1052672+0 records in 1052672+0 records out 4311744512 bytes (4.3 GB) copied, 226.133 s, 19.1 MB/s $ hexdump -C zeros 00000000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................| * 101000000 The hexdump output should show all zeros. A non patched kernel will show non-zero bytes. [Original Bug Report] on extracting files with extracted size >4 GB files are getting currupted. interestingly file gets currupted in the very moment the file size gets more than 4GB. ProblemType: Bug DistroRelease: Ubuntu 13.10 Package: linux-image-3.11.0-12-generic 3.11.0-12.19 ProcVersionSignature: Ubuntu 3.11.0-12.19-generic 3.11.3 Uname: Linux 3.11.0-12-generic i686 ApportVersion: 2.12.5-0ubuntu2 Architecture: i386 Date: Wed Oct 23 12:11:43 2013 EcryptfsInUse: Yes InstallationDate: Installed on 2013-07-20 (94 days ago) InstallationMedia: Ubuntu 13.04 "Raring Ringtail" - Release i386 (20130424) MarkForUpload: True ProcEnviron:  TERM=xterm  PATH=(custom, no user)  XDG_RUNTIME_DIR=<set>  LANG=de_DE.UTF-8  SHELL=/bin/bash ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.11.0-12-generic root=UUID=e97431f7-60b7-4fbe-b22f-5ca3304f2d50 ro quiet splash vt.handoff=7 SourcePackage: linux UpgradeStatus: Upgraded to saucy on 2013-09-08 (45 days ago)
2013-10-25 14:18:21 Colin Ian King summary ecryptfs currupts files over 4GB size on i686 ecryptfs corrupts files over 4GB size on i686
2013-10-25 16:11:17 Tyler Hicks description [SRU Justification] Commit 24d15266bd86b7961f309a962fa3aa177a78c49f introduced a data corruption regression on 32 bit architectures when writing past the 4 GB. [Impact] 32 bit users experience corruption of large files. [Fix] A cast is needed when shifting the page's index. Colin and I independently identified the problem. It is a simple fix that is currently located in the eCryptfs next branch: http://git.kernel.org/cgit/linux/kernel/git/tyhicks/ecryptfs.git/commit/?h=next&id=43b7c6c6a4e3916edd186ceb61be0c67d1e0969e I've sent a pull request to Linus, but he has not yet had a chance to pull in the change: https://lkml.org/lkml/2013/10/24/424 [Test Case] Inside of an eCryptfs mount on an i686 Ubuntu install, create a file containing 4 GB + 1 page worth (4096 bytes) of zeros. Then inspect the file for non-zero bytes. $ rm zeros $ dd if=/dev/zero of=zeros bs=4096 count=$((4*1024*1024*1024/4096+4096)) 1052672+0 records in 1052672+0 records out 4311744512 bytes (4.3 GB) copied, 226.133 s, 19.1 MB/s $ hexdump -C zeros 00000000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................| * 101000000 The hexdump output should show all zeros. A non patched kernel will show non-zero bytes. [Original Bug Report] on extracting files with extracted size >4 GB files are getting currupted. interestingly file gets currupted in the very moment the file size gets more than 4GB. ProblemType: Bug DistroRelease: Ubuntu 13.10 Package: linux-image-3.11.0-12-generic 3.11.0-12.19 ProcVersionSignature: Ubuntu 3.11.0-12.19-generic 3.11.3 Uname: Linux 3.11.0-12-generic i686 ApportVersion: 2.12.5-0ubuntu2 Architecture: i386 Date: Wed Oct 23 12:11:43 2013 EcryptfsInUse: Yes InstallationDate: Installed on 2013-07-20 (94 days ago) InstallationMedia: Ubuntu 13.04 "Raring Ringtail" - Release i386 (20130424) MarkForUpload: True ProcEnviron:  TERM=xterm  PATH=(custom, no user)  XDG_RUNTIME_DIR=<set>  LANG=de_DE.UTF-8  SHELL=/bin/bash ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.11.0-12-generic root=UUID=e97431f7-60b7-4fbe-b22f-5ca3304f2d50 ro quiet splash vt.handoff=7 SourcePackage: linux UpgradeStatus: Upgraded to saucy on 2013-09-08 (45 days ago) [SRU Justification] Commit 24d15266bd86b7961f309a962fa3aa177a78c49f introduced a data corruption regression on 32 bit architectures when writing past the 4 GB. [Impact] 32 bit users experience corruption of large files. [Fix] A cast is needed when shifting the page's index. Colin and I independently identified the problem. It is a simple fix that has been merged upstream: http://git.kernel.org/linus/43b7c6c6a4e3916edd186ceb61be0c67d1e0969e [Test Case] Inside of an eCryptfs mount on an i686 Ubuntu install, create a file containing 4 GB + 1 page worth (4096 bytes) of zeros. Then inspect the file for non-zero bytes. $ rm zeros $ dd if=/dev/zero of=zeros bs=4096 count=$((4*1024*1024*1024/4096+4096)) 1052672+0 records in 1052672+0 records out 4311744512 bytes (4.3 GB) copied, 226.133 s, 19.1 MB/s $ hexdump -C zeros 00000000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................| * 101000000 The hexdump output should show all zeros. A non patched kernel will show non-zero bytes. [Original Bug Report] on extracting files with extracted size >4 GB files are getting currupted. interestingly file gets currupted in the very moment the file size gets more than 4GB. ProblemType: Bug DistroRelease: Ubuntu 13.10 Package: linux-image-3.11.0-12-generic 3.11.0-12.19 ProcVersionSignature: Ubuntu 3.11.0-12.19-generic 3.11.3 Uname: Linux 3.11.0-12-generic i686 ApportVersion: 2.12.5-0ubuntu2 Architecture: i386 Date: Wed Oct 23 12:11:43 2013 EcryptfsInUse: Yes InstallationDate: Installed on 2013-07-20 (94 days ago) InstallationMedia: Ubuntu 13.04 "Raring Ringtail" - Release i386 (20130424) MarkForUpload: True ProcEnviron:  TERM=xterm  PATH=(custom, no user)  XDG_RUNTIME_DIR=<set>  LANG=de_DE.UTF-8  SHELL=/bin/bash ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.11.0-12-generic root=UUID=e97431f7-60b7-4fbe-b22f-5ca3304f2d50 ro quiet splash vt.handoff=7 SourcePackage: linux UpgradeStatus: Upgraded to saucy on 2013-09-08 (45 days ago)
2013-10-25 16:11:22 Tyler Hicks ecryptfs: status In Progress Fix Committed
2013-10-28 23:01:15 striscio bug added subscriber striscio
2013-11-12 17:29:21 Joseph Salisbury tags apport-bug i386 kernel-bug-exists-upstream kernel-key patch saucy tasty apport-bug i386 kernel-bug-exists-upstream patch saucy tasty
2013-11-14 10:32:03 Launchpad Janitor branch linked lp:ubuntu/precise-proposed/linux-lts-saucy
2013-11-14 16:36:58 Brad Figg linux (Ubuntu): status In Progress Fix Committed
2013-11-18 02:14:50 Brad Figg tags apport-bug i386 kernel-bug-exists-upstream patch saucy tasty apport-bug i386 kernel-bug-exists-upstream patch saucy tasty verification-needed-saucy
2013-11-18 14:58:59 Lars Düsing tags apport-bug i386 kernel-bug-exists-upstream patch saucy tasty verification-needed-saucy apport-bug i386 kernel-bug-exists-upstream patch saucy tasty verification-done-saucy
2013-11-20 08:23:03 Launchpad Janitor branch linked lp:ubuntu/saucy-proposed/linux-exynos5
2013-12-03 01:28:13 Launchpad Janitor linux (Ubuntu): status Fix Committed Fix Released
2013-12-03 01:28:13 Launchpad Janitor cve linked 2013-4299
2015-03-11 15:42:43 Dustin Kirkland  ecryptfs: status Fix Committed Fix Released