--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: linux: unstable kernel/data corruption on ppc64el
- From: Aurelien Jarno <aurel32@debian.org>
- Date: Fri, 23 Feb 2018 19:52:35 +0100
- Message-id: <151941195533.896.15071533578895255231.reportbug@ohm.local>
Source: linux
Version: 4.9.82-1+deb9u2
Severity: critical
Justification: causes serious data corruption
DSA has installed the latest security kernel (4.9.82-1+deb9u2) on the
Debian POWER8 machines running ppc64el. While they boot correctly, then
programs segfault randomly (apt, sbuild, systemd, etc...). Passing
no_rfi_flush to the command line does not change anything. Looking more
in details, things looks scarying as some code actually get wrongly
executed. Here are some build logs examples:
- https://buildd.debian.org/status/fetch.php?pkg=python-msgpack&arch=ppc64el&ver=0.5.1-1&stamp=1519399908&raw=0
- https://buildd.debian.org/status/fetch.php?pkg=python-msgpack&arch=ppc64el&ver=0.5.1-1&stamp=1519396907&raw=0
- https://buildd.debian.org/status/fetch.php?pkg=tk8.5&arch=ppc64el&ver=8.5.19-3&stamp=1519362938&raw=0
While in the above case the packages fail to build from source, I guess
there are also some cases of undetected corruptions.
I'll try to run the 4.9.80-2 kernel at some point to narrow down the
issue.
--- End Message ---
--- Begin Message ---
- To: Breno Leitao <brenohl@br.ibm.com>
- Cc: 891249-done@bugs.debian.org
- Subject: Re: Bug#891249: linux: unstable kernel/data corruption on ppc64el
- From: Aurelien Jarno <aurel32@debian.org>
- Date: Sat, 3 Mar 2018 12:01:30 +0100
- Message-id: <20180303110130.GB14277@aurel32.net>
- In-reply-to: <20180226141148.GA3040@aurel32.net>
- References: <151941195533.896.15071533578895255231.reportbug@ohm.local> <b1595238-d609-97f9-f67d-b9366411dd0d@br.ibm.com> <151941195533.896.15071533578895255231.reportbug@ohm.local> <20180226141148.GA3040@aurel32.net>
Version: linux/4.9.82-1+deb9u3
On 2018-02-26 15:11, Aurelien Jarno wrote:
> tag 891249 + fixed-upstream
> thanks
>
> On 2018-02-26 11:01, Breno Leitao wrote:
> > Hi,
> >
> > On 02/23/2018 03:52 PM, Aurelien Jarno wrote:
> >
> > > DSA has installed the latest security kernel (4.9.82-1+deb9u2) on the
> > > Debian POWER8 machines running ppc64el. While they boot correctly, then
> > > programs segfault randomly (apt, sbuild, systemd, etc...). Passing
> > > no_rfi_flush to the command line does not change anything. Looking more
> > > in details, things looks scarying as some code actually get wrongly
> > > executed. Here are some build logs examples:
> > > - https://buildd.debian.org/status/fetch.php?pkg=python-msgpack&arch=ppc64el&ver=0.5.1-1&stamp=1519399908&raw=0
> > > - https://buildd.debian.org/status/fetch.php?pkg=python-msgpack&arch=ppc64el&ver=0.5.1-1&stamp=1519396907&raw=0
> > > - https://buildd.debian.org/status/fetch.php?pkg=tk8.5&arch=ppc64el&ver=8.5.19-3&stamp=1519362938&raw=0
> > >
> > > While in the above case the packages fail to build from source, I guess
> > > there are also some cases of undetected corruptions.
> > >
> > > I'll try to run the 4.9.80-2 kernel at some point to narrow down the
> > > issue.
> >
> > I talked to the powerpc maintainer about this problem, and in fact this is a knew
> > problem, since the 4.4 patches were 'backported' to 4.9 without success.
> >
> > This is already fixed and in the stable tree already:
> >
> > https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git/log/arch/powerpc?h=linux-4.9.y
> >
> > I understand that the commit ids are:
> > * 3146a32b39cd78722869bca6e839b3c59155e012
> > * efe8bc07c47fff196bbc0822e249a27ae0574d24
> > * ec0084d082137b73460303b39f4089970a213ad7
> >
> > But I suppose that Debian will do a full merge with the stable tree, then, I expect
> > that the next release will just work.
>
> Thanks for the quick answer. I confirm that these commit are indeed in
> the 4.9.84 stable release, which has been released yesterday. I guess
> 3146a32b39cd78722869bca6e839b3c59155e012 is the one which fixes the data
> corruption.
Those patches have been backported in linux 4.9.82-1+deb9u3, which has
just been released on security.debian.org. Closing the bug.
Aurelien
--
Aurelien Jarno GPG: 4096R/1DDD8C9B
aurelien@aurel32.net http://www.aurel32.net
--- End Message ---