Activity log for bug #1701316

Date Who What changed Old value New value Message
2017-06-29 16:09:24 Peter Sabaini bug added bug
2017-06-29 16:09:24 Peter Sabaini attachment added apport.linux-image-4.10.0-26-generic.yd28tuoe.apport https://bugs.launchpad.net/bugs/1701316/+attachment/4905802/+files/apport.linux-image-4.10.0-26-generic.yd28tuoe.apport
2017-06-29 16:10:43 Launchpad Janitor linux (Ubuntu): status New Confirmed
2017-06-29 16:11:16 Peter Sabaini bug added subscriber The Canonical Sysadmins
2017-07-03 05:37:22 Junien F bug added subscriber Junien Fridrick
2017-07-05 16:21:59 Seth Forshee bug added subscriber Seth Forshee
2017-07-06 13:37:43 Joseph Salisbury linux (Ubuntu): importance Undecided High
2017-07-06 13:38:07 Joseph Salisbury tags canonical-bootstack canonical-bootstack kernel-key
2017-07-06 14:58:05 Brad Figg linux (Ubuntu): assignee Seth Forshee (sforshee)
2017-07-07 08:26:40 Jonas Andrén bug added subscriber Jonas Andrén
2017-07-07 13:07:01 Seth Forshee nominated for series Ubuntu Artful
2017-07-07 13:07:01 Seth Forshee bug task added linux (Ubuntu Artful)
2017-07-07 13:07:01 Seth Forshee nominated for series Ubuntu Xenial
2017-07-07 13:07:01 Seth Forshee bug task added linux (Ubuntu Xenial)
2017-07-07 13:07:01 Seth Forshee nominated for series Ubuntu Zesty
2017-07-07 13:07:01 Seth Forshee bug task added linux (Ubuntu Zesty)
2017-07-07 13:07:01 Seth Forshee nominated for series Ubuntu Yakkety
2017-07-07 13:07:01 Seth Forshee bug task added linux (Ubuntu Yakkety)
2017-07-07 13:07:23 Seth Forshee linux (Ubuntu Xenial): importance Undecided High
2017-07-07 13:07:23 Seth Forshee linux (Ubuntu Xenial): status New In Progress
2017-07-07 13:07:23 Seth Forshee linux (Ubuntu Xenial): assignee Seth Forshee (sforshee)
2017-07-07 13:07:34 Seth Forshee linux (Ubuntu Yakkety): status New In Progress
2017-07-07 13:07:34 Seth Forshee linux (Ubuntu Yakkety): assignee Seth Forshee (sforshee)
2017-07-07 13:07:42 Seth Forshee linux (Ubuntu Yakkety): importance Undecided High
2017-07-07 13:07:52 Seth Forshee linux (Ubuntu Zesty): importance Undecided High
2017-07-07 13:07:52 Seth Forshee linux (Ubuntu Zesty): status New In Progress
2017-07-07 13:07:52 Seth Forshee linux (Ubuntu Zesty): assignee Seth Forshee (sforshee)
2017-07-07 13:08:00 Seth Forshee linux (Ubuntu Artful): status Confirmed In Progress
2017-07-07 13:12:29 Seth Forshee linux (Ubuntu Artful): status In Progress Fix Committed
2017-07-07 13:12:43 Seth Forshee linux (Ubuntu Xenial): status In Progress Invalid
2017-07-10 15:35:09 Joseph Salisbury tags canonical-bootstack kernel-key canonical-bootstack
2017-07-11 12:05:52 Seth Forshee description We are seeing data corruption issues using the hio driver with kernel 4.10.0 # uname -a Linux arbok 4.10.0-26-generic #30~16.04.1-Ubuntu SMP Tue Jun 27 09:40:14 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux Making xfs fails: root@arbok:~# mkfs.xfs /dev/hioa meta-data=/dev/hioa isize=512 agcount=4, agsize=48835584 blks = sectsz=512 attr=2, projid32bit=1 = crc=1 finobt=1, sparse=0 data = bsize=4096 blocks=195342336, imaxpct=25 = sunit=0 swidth=0 blks naming =version 2 bsize=4096 ascii-ci=0 ftype=1 log =internal log bsize=4096 blocks=95382, version=2 = sectsz=512 sunit=0 blks, lazy-count=1 realtime =none extsz=4096 blocks=0, rtextents=0 bad magic number bad magic number Metadata corruption detected at xfs_sb block 0x0/0x200 libxfs_writebufr: write verifer failed on xfs_sb bno 0x0/0x200 The drive appears to be healthy. Firmware has been upgraded to ver 656: root@arbok:~# hio_info -d /dev/hioa hioa Serial number: 022XWV10G2000325 Size(GB): 800 Max size(GB): 800 Hardware version: 1.0 Firmware version: 656 Driver version: 2.1.0.28 Work mode: MLC Run time (sec.): 8910490 Total read(MB): 8499 Total write(MB): 0 Lifetime remaining: 99.844% Max bad block rate: 0.167% Health: OK Comment: NA No relevant entries about read/write errors in dmesg Also just copying 8G random data and reading those back gives a hash mismatch: root@arbok:~# dd if=/dev/urandom of=test.dat bs=1G count=8 iflag=fullblock 8+0 records in 8+0 records out 8589934592 bytes (8.6 GB, 8.0 GiB) copied, 85.6076 s, 100 MB/s root@arbok:~# dd if=test.dat of=/dev/hioa bs=1G count=8 iflag=fullblock 8+0 records in 8+0 records out 8589934592 bytes (8.6 GB, 8.0 GiB) copied, 10.6034 s, 810 MB/s root@arbok:~# dd if=/dev/hioa of=read-back.dat bs=1G count=8 iflag=fullblock sha256sum test.dat read- 8+0 records in 8+0 records out 8589934592 bytes (8.6 GB, 8.0 GiB) copied, 66.1872 s, 130 MB/s root@arbok:~# sha256sum test.dat read-back.dat 6376d245a07c42c990589a3c17c44e63d826d1cb583fc5a065deff9dae69fd3a test.dat ebfb4ef19ae410f190327b5ebd312711263bc7579970e87d9c1e2d84e06b3c25 read-back.dat Impact: Data corruption is seen when using the hio driver with 4.8 and later kernels. Fix: Patch to fix incorrect use of enumerated values as bitmasks. Test case: See below. Regression potential: Very low. Changes are simple and Obviously Correct (TM), and they only affect the hio driver. --- We are seeing data corruption issues using the hio driver with kernel 4.10.0 # uname -a Linux arbok 4.10.0-26-generic #30~16.04.1-Ubuntu SMP Tue Jun 27 09:40:14 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux Making xfs fails: root@arbok:~# mkfs.xfs /dev/hioa meta-data=/dev/hioa isize=512 agcount=4, agsize=48835584 blks          = sectsz=512 attr=2, projid32bit=1          = crc=1 finobt=1, sparse=0 data = bsize=4096 blocks=195342336, imaxpct=25          = sunit=0 swidth=0 blks naming =version 2 bsize=4096 ascii-ci=0 ftype=1 log =internal log bsize=4096 blocks=95382, version=2          = sectsz=512 sunit=0 blks, lazy-count=1 realtime =none extsz=4096 blocks=0, rtextents=0 bad magic number bad magic number Metadata corruption detected at xfs_sb block 0x0/0x200 libxfs_writebufr: write verifer failed on xfs_sb bno 0x0/0x200 The drive appears to be healthy. Firmware has been upgraded to ver 656: root@arbok:~# hio_info -d /dev/hioa hioa Serial number: 022XWV10G2000325         Size(GB): 800         Max size(GB): 800         Hardware version: 1.0         Firmware version: 656         Driver version: 2.1.0.28         Work mode: MLC         Run time (sec.): 8910490         Total read(MB): 8499         Total write(MB): 0         Lifetime remaining: 99.844%         Max bad block rate: 0.167%         Health: OK         Comment: NA No relevant entries about read/write errors in dmesg Also just copying 8G random data and reading those back gives a hash mismatch: root@arbok:~# dd if=/dev/urandom of=test.dat bs=1G count=8 iflag=fullblock 8+0 records in 8+0 records out 8589934592 bytes (8.6 GB, 8.0 GiB) copied, 85.6076 s, 100 MB/s root@arbok:~# dd if=test.dat of=/dev/hioa bs=1G count=8 iflag=fullblock 8+0 records in 8+0 records out 8589934592 bytes (8.6 GB, 8.0 GiB) copied, 10.6034 s, 810 MB/s root@arbok:~# dd if=/dev/hioa of=read-back.dat bs=1G count=8 iflag=fullblock sha256sum test.dat read- 8+0 records in 8+0 records out 8589934592 bytes (8.6 GB, 8.0 GiB) copied, 66.1872 s, 130 MB/s root@arbok:~# sha256sum test.dat read-back.dat 6376d245a07c42c990589a3c17c44e63d826d1cb583fc5a065deff9dae69fd3a test.dat ebfb4ef19ae410f190327b5ebd312711263bc7579970e87d9c1e2d84e06b3c25 read-back.dat
2017-07-11 12:17:55 Seth Forshee description Impact: Data corruption is seen when using the hio driver with 4.8 and later kernels. Fix: Patch to fix incorrect use of enumerated values as bitmasks. Test case: See below. Regression potential: Very low. Changes are simple and Obviously Correct (TM), and they only affect the hio driver. --- We are seeing data corruption issues using the hio driver with kernel 4.10.0 # uname -a Linux arbok 4.10.0-26-generic #30~16.04.1-Ubuntu SMP Tue Jun 27 09:40:14 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux Making xfs fails: root@arbok:~# mkfs.xfs /dev/hioa meta-data=/dev/hioa isize=512 agcount=4, agsize=48835584 blks          = sectsz=512 attr=2, projid32bit=1          = crc=1 finobt=1, sparse=0 data = bsize=4096 blocks=195342336, imaxpct=25          = sunit=0 swidth=0 blks naming =version 2 bsize=4096 ascii-ci=0 ftype=1 log =internal log bsize=4096 blocks=95382, version=2          = sectsz=512 sunit=0 blks, lazy-count=1 realtime =none extsz=4096 blocks=0, rtextents=0 bad magic number bad magic number Metadata corruption detected at xfs_sb block 0x0/0x200 libxfs_writebufr: write verifer failed on xfs_sb bno 0x0/0x200 The drive appears to be healthy. Firmware has been upgraded to ver 656: root@arbok:~# hio_info -d /dev/hioa hioa Serial number: 022XWV10G2000325         Size(GB): 800         Max size(GB): 800         Hardware version: 1.0         Firmware version: 656         Driver version: 2.1.0.28         Work mode: MLC         Run time (sec.): 8910490         Total read(MB): 8499         Total write(MB): 0         Lifetime remaining: 99.844%         Max bad block rate: 0.167%         Health: OK         Comment: NA No relevant entries about read/write errors in dmesg Also just copying 8G random data and reading those back gives a hash mismatch: root@arbok:~# dd if=/dev/urandom of=test.dat bs=1G count=8 iflag=fullblock 8+0 records in 8+0 records out 8589934592 bytes (8.6 GB, 8.0 GiB) copied, 85.6076 s, 100 MB/s root@arbok:~# dd if=test.dat of=/dev/hioa bs=1G count=8 iflag=fullblock 8+0 records in 8+0 records out 8589934592 bytes (8.6 GB, 8.0 GiB) copied, 10.6034 s, 810 MB/s root@arbok:~# dd if=/dev/hioa of=read-back.dat bs=1G count=8 iflag=fullblock sha256sum test.dat read- 8+0 records in 8+0 records out 8589934592 bytes (8.6 GB, 8.0 GiB) copied, 66.1872 s, 130 MB/s root@arbok:~# sha256sum test.dat read-back.dat 6376d245a07c42c990589a3c17c44e63d826d1cb583fc5a065deff9dae69fd3a test.dat ebfb4ef19ae410f190327b5ebd312711263bc7579970e87d9c1e2d84e06b3c25 read-back.dat Impact: Data corruption is seen when using the hio driver with 4.10 and later kernels. Fix: Patch to fix incorrect use of enumerated values as bitmasks. Test case: See below. Regression potential: Very low. Changes are simple and Obviously Correct (TM), and they only affect the hio driver. --- We are seeing data corruption issues using the hio driver with kernel 4.10.0 # uname -a Linux arbok 4.10.0-26-generic #30~16.04.1-Ubuntu SMP Tue Jun 27 09:40:14 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux Making xfs fails: root@arbok:~# mkfs.xfs /dev/hioa meta-data=/dev/hioa isize=512 agcount=4, agsize=48835584 blks          = sectsz=512 attr=2, projid32bit=1          = crc=1 finobt=1, sparse=0 data = bsize=4096 blocks=195342336, imaxpct=25          = sunit=0 swidth=0 blks naming =version 2 bsize=4096 ascii-ci=0 ftype=1 log =internal log bsize=4096 blocks=95382, version=2          = sectsz=512 sunit=0 blks, lazy-count=1 realtime =none extsz=4096 blocks=0, rtextents=0 bad magic number bad magic number Metadata corruption detected at xfs_sb block 0x0/0x200 libxfs_writebufr: write verifer failed on xfs_sb bno 0x0/0x200 The drive appears to be healthy. Firmware has been upgraded to ver 656: root@arbok:~# hio_info -d /dev/hioa hioa Serial number: 022XWV10G2000325         Size(GB): 800         Max size(GB): 800         Hardware version: 1.0         Firmware version: 656         Driver version: 2.1.0.28         Work mode: MLC         Run time (sec.): 8910490         Total read(MB): 8499         Total write(MB): 0         Lifetime remaining: 99.844%         Max bad block rate: 0.167%         Health: OK         Comment: NA No relevant entries about read/write errors in dmesg Also just copying 8G random data and reading those back gives a hash mismatch: root@arbok:~# dd if=/dev/urandom of=test.dat bs=1G count=8 iflag=fullblock 8+0 records in 8+0 records out 8589934592 bytes (8.6 GB, 8.0 GiB) copied, 85.6076 s, 100 MB/s root@arbok:~# dd if=test.dat of=/dev/hioa bs=1G count=8 iflag=fullblock 8+0 records in 8+0 records out 8589934592 bytes (8.6 GB, 8.0 GiB) copied, 10.6034 s, 810 MB/s root@arbok:~# dd if=/dev/hioa of=read-back.dat bs=1G count=8 iflag=fullblock sha256sum test.dat read- 8+0 records in 8+0 records out 8589934592 bytes (8.6 GB, 8.0 GiB) copied, 66.1872 s, 130 MB/s root@arbok:~# sha256sum test.dat read-back.dat 6376d245a07c42c990589a3c17c44e63d826d1cb583fc5a065deff9dae69fd3a test.dat ebfb4ef19ae410f190327b5ebd312711263bc7579970e87d9c1e2d84e06b3c25 read-back.dat
2017-07-14 15:14:45 Thadeu Lima de Souza Cascardo linux (Ubuntu Zesty): status In Progress Fix Committed
2017-07-14 15:20:04 Thadeu Lima de Souza Cascardo linux (Ubuntu Yakkety): status In Progress Fix Committed
2017-07-21 09:25:16 Kleber Sacilotto de Souza tags canonical-bootstack canonical-bootstack verification-needed-zesty
2017-07-26 15:23:42 Andy Whitcroft linux (Ubuntu Yakkety): status Fix Committed Won't Fix
2017-08-02 12:34:35 Peter Sabaini tags canonical-bootstack verification-needed-zesty canonical-bootstack verification-done-zesty
2017-08-03 16:29:32 Launchpad Janitor linux (Ubuntu Zesty): status Fix Committed Fix Released
2017-08-03 16:29:32 Launchpad Janitor cve linked 2017-1000364
2017-08-03 16:29:32 Launchpad Janitor cve linked 2017-1000365
2017-08-03 16:29:32 Launchpad Janitor cve linked 2017-10810
2017-08-03 16:29:32 Launchpad Janitor cve linked 2017-7482
2017-08-03 16:29:32 Launchpad Janitor cve linked 2017-7533
2017-08-10 05:56:17 Launchpad Janitor linux (Ubuntu Artful): status Fix Committed Fix Released