Activity log for bug #1682644

Date Who What changed Old value New value Message
2017-04-13 21:09:10 bugproxy bug added bug
2017-04-13 21:09:12 bugproxy tags architecture-ppc64le bugnameltc-153445 severity-critical targetmilestone-inin16043
2017-04-13 21:09:14 bugproxy ubuntu: assignee Taco Screen team (taco-screen-team)
2017-04-13 21:09:19 bugproxy affects ubuntu linux (Ubuntu)
2017-04-17 17:40:27 Joseph Salisbury tags architecture-ppc64le bugnameltc-153445 severity-critical targetmilestone-inin16043 architecture-ppc64le bugnameltc-153445 kernel-da-key severity-critical targetmilestone-inin16043
2017-04-21 12:44:12 Leann Ogasawara linux (Ubuntu): importance Undecided High
2017-04-21 12:44:12 Leann Ogasawara linux (Ubuntu): status New Triaged
2017-04-21 12:44:12 Leann Ogasawara linux (Ubuntu): assignee Taco Screen team (taco-screen-team) Canonical Kernel Team (canonical-kernel-team)
2017-08-18 16:29:09 Mauricio Faria de Oliveira description ---Problem Description--- IPR driver causes multipath to fail paths/stuck IO on Medium Errors This problem is resolved with this upstream accepted patch, scheduled for 4.11. The detailed problem description and resolution are described in the commit message. > scsi: ipr: do not set DID_PASSTHROUGH on CHECK CONDITION > http://git.kernel.org/?p=linux/kernel/git/jejb/scsi.git;a=commit;h=785a470496d8e0a32e3d39f376984eb2c98ca5b3 Please apply to 17.04 and 16.04. The business justification for the SRU is: Clients with a dual-controller multipathed IPR configuration that eventually runs into failing disk/sectors, will experience an I/O hang once the drive reports a Medium Error, which can hang an application or even the root filesystem (whatever is doing I/O to the failing drive), potentially hanging the system. Thanks. ---Additional Hardware Info--- Dual (IPR) controller setup, multipath enabled ---Steps to Reproduce--- 1) Use a disk with bad sectors (or force such condition, via internal/special tools) 2) Multipath that disk 3) Run IO to the multipath device on the bad sectors 4) Both paths will be failed, and IO is stuck due to queue_if_no_path (enabled by default for IPR) The detailed problem description and resolution are described in the commit message. SRU Justification: Impact: stuck I/O to multipath disks with medium errors (on IPR controllers) Fix: upstream commit for IPR driver to allow SCSI layer to handle the error Testcase: perform I/O to a failing disk which is multipathed (on IPR controller), which returns SCSI Medium Errors (without the fix, the I/O gets stuck). the commit message describes a test-case w/ sg_dd. ---Problem Description--- IPR driver causes multipath to fail paths/stuck IO on Medium Errors This problem is resolved with this upstream accepted patch, scheduled for 4.11. The detailed problem description and resolution are described in the commit message. > scsi: ipr: do not set DID_PASSTHROUGH on CHECK CONDITION > https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=785a470496d8e0a32e3d39f376984eb2c98ca5b3 Please apply to 17.04 (target 16.04.3 HWE kernel) and 16.04 (GA kernel). Patch already applied to 17.10. The business justification for the SRU is: Clients with a dual-controller multipathed IPR configuration that eventually runs into failing disk/sectors, will experience an I/O hang once the drive reports a Medium Error, which can hang an application or even the root filesystem (whatever is doing I/O to the failing drive), potentially hanging the system. Thanks. ---Additional Hardware Info--- Dual (IPR) controller setup, multipath enabled ---Steps to Reproduce--- 1) Use a disk with bad sectors (or force such condition, via internal/special tools) 2) Multipath that disk 3) Run IO to the multipath device on the bad sectors 4) Both paths will be failed, and IO is stuck due to queue_if_no_path (enabled by default for IPR) The detailed problem description and resolution are described in the commit message.
2017-08-21 10:10:38 Stefan Bader nominated for series Ubuntu Zesty
2017-08-21 10:10:38 Stefan Bader bug task added linux (Ubuntu Zesty)
2017-08-21 10:10:38 Stefan Bader nominated for series Ubuntu Xenial
2017-08-21 10:10:38 Stefan Bader bug task added linux (Ubuntu Xenial)
2017-08-22 13:56:16 Joseph Salisbury linux (Ubuntu Xenial): status New Triaged
2017-08-22 13:56:19 Joseph Salisbury linux (Ubuntu Zesty): status New Triaged
2017-08-22 13:56:22 Joseph Salisbury linux (Ubuntu Xenial): importance Undecided High
2017-08-22 13:56:24 Joseph Salisbury linux (Ubuntu Zesty): importance Undecided High
2017-08-24 12:09:17 bugproxy tags architecture-ppc64le bugnameltc-153445 kernel-da-key severity-critical targetmilestone-inin16043 architecture-ppc64le bugnameltc-153445 kernel-da-key severity-high targetmilestone-inin16043
2017-08-28 13:23:13 Thadeu Lima de Souza Cascardo linux (Ubuntu Zesty): status Triaged Fix Committed
2017-08-28 15:12:14 Kleber Sacilotto de Souza linux (Ubuntu Xenial): status Triaged Fix Committed
2017-09-01 08:26:16 Kleber Sacilotto de Souza tags architecture-ppc64le bugnameltc-153445 kernel-da-key severity-high targetmilestone-inin16043 architecture-ppc64le bugnameltc-153445 kernel-da-key severity-high targetmilestone-inin16043 verification-needed-zesty
2017-09-01 08:27:58 Kleber Sacilotto de Souza tags architecture-ppc64le bugnameltc-153445 kernel-da-key severity-high targetmilestone-inin16043 verification-needed-zesty architecture-ppc64le bugnameltc-153445 kernel-da-key severity-high targetmilestone-inin16043 verification-needed-xenial verification-needed-zesty
2017-09-01 23:59:19 bugproxy tags architecture-ppc64le bugnameltc-153445 kernel-da-key severity-high targetmilestone-inin16043 verification-needed-xenial verification-needed-zesty architecture-ppc64le bugnameltc-153445 kernel-da-key severity-high targetmilestone-inin16043 verification-done-zesty
2017-09-02 00:39:20 bugproxy tags architecture-ppc64le bugnameltc-153445 kernel-da-key severity-high targetmilestone-inin16043 verification-done-zesty architecture-ppc64le bugnameltc-153445 kernel-da-key severity-high targetmilestone-inin16043 verification-done-xenial verification-done-zesty
2017-09-18 09:21:44 Launchpad Janitor linux (Ubuntu Zesty): status Fix Committed Fix Released
2017-09-18 09:21:44 Launchpad Janitor cve linked 2017-1000251
2017-09-18 09:21:44 Launchpad Janitor cve linked 2017-7541
2017-09-18 09:21:45 Launchpad Janitor linux (Ubuntu Zesty): status Fix Committed Fix Released
2017-09-18 10:11:08 Launchpad Janitor linux (Ubuntu Xenial): status Fix Committed Fix Released