Activity log for bug #1802421

Date Who What changed Old value New value Message
2018-11-09 01:04:35 Daniel Axtens bug added bug
2018-11-09 01:10:22 Daniel Axtens description A user reports that using an i40e with intel_iommu=on with the Xenial GA kernel causes data corruption. Using the Xenial HWE kernel or an out-of-tree driver more recent than the version shipped with Xenial solves the issue. [Impact] Corrupted data is returned from the network card intermittently. This is often noticeable when using apt, as the checksums are verified. If often leads to failure of apt operations. When there are no checksums done, this could lead to silent data corruption. [Fix] This was fixed somewhere post-4.4. Testing identified b32bfa17246d ("i40e: Drop packet split receive routine") which is part of a broader refactor. My theory is that iommu exposes an issue in the packet split receive routine and so removing it is sufficient to prevent the problem from occurring. [Test] A user tested a Xenial 4.4 kernel with this patch applied and it fixed their issue - no data corruption was observed. (The test repeatedly deletes the apt cache and then does apt update.) [Regression Potential] It's a messy change inside i40e, so the risk is that i40e will be broken in some subtle way we haven't noticed, or have performance issues. None of these have been observed so far. A user reports that using an i40e with intel_iommu=on with the Xenial GA kernel causes data corruption. Using the Xenial HWE kernel or an out-of-tree driver more recent than the version shipped with Xenial solves the issue. [Impact] Corrupted data is returned from the network card intermittently. This is often noticeable when using apt, as the checksums are verified. If often leads to failure of apt operations. When there are no checksums done, this could lead to silent data corruption. [Fix] This was fixed somewhere post-4.4. Testing identified b32bfa17246d ("i40e: Drop packet split receive routine") which is part of a broader refactor. Picking this patch alone is sufficient to fix the issue. My theory is that iommu exposes an issue in the packet split receive routine and so removing it is sufficient to prevent the problem from occurring. [Test] A user tested a Xenial 4.4 kernel with this patch applied and it fixed their issue - no data corruption was observed. (The test repeatedly deletes the apt cache and then does apt update.) [Regression Potential] It's a messy change inside i40e, so the risk is that i40e will be broken in some subtle way we haven't noticed, or have performance issues. None of these have been observed so far.
2018-11-09 09:51:33 Mauricio Faria de Oliveira bug added subscriber Mauricio Faria de Oliveira
2018-11-09 16:56:36 Kleber Sacilotto de Souza nominated for series Ubuntu Xenial
2018-11-09 16:56:36 Kleber Sacilotto de Souza bug task added linux (Ubuntu Xenial)
2018-11-09 16:57:18 Kleber Sacilotto de Souza linux (Ubuntu Xenial): status New In Progress
2019-01-08 04:45:26 Khaled El Mously linux (Ubuntu Xenial): status In Progress Fix Committed
2019-01-17 14:22:05 Brad Figg tags verification-needed-xenial
2019-01-23 03:20:50 Daniel Axtens tags verification-needed-xenial verification-done-xenial
2019-02-04 08:47:55 Launchpad Janitor linux (Ubuntu Xenial): status Fix Committed Fix Released
2019-02-04 08:47:55 Launchpad Janitor cve linked 2000-1134
2019-02-04 08:47:55 Launchpad Janitor cve linked 2007-3852
2019-02-04 08:47:55 Launchpad Janitor cve linked 2008-0525
2019-02-04 08:47:55 Launchpad Janitor cve linked 2009-0416
2019-02-04 08:47:55 Launchpad Janitor cve linked 2011-4834
2019-02-04 08:47:55 Launchpad Janitor cve linked 2015-1838
2019-02-04 08:47:55 Launchpad Janitor cve linked 2015-7442
2019-02-04 08:47:55 Launchpad Janitor cve linked 2016-7489
2019-02-04 08:47:55 Launchpad Janitor cve linked 2017-5715
2019-02-04 08:47:55 Launchpad Janitor cve linked 2018-19407
2019-07-24 21:30:09 Brad Figg tags verification-done-xenial cscc verification-done-xenial