2018-11-09 01:04:35 |
Daniel Axtens |
bug |
|
|
added bug |
2018-11-09 01:10:22 |
Daniel Axtens |
description |
A user reports that using an i40e with intel_iommu=on with the Xenial GA kernel causes data corruption. Using the Xenial HWE kernel or an out-of-tree driver more recent than the version shipped with Xenial solves the issue.
[Impact]
Corrupted data is returned from the network card intermittently. This is often noticeable when using apt, as the checksums are verified. If often leads to failure of apt operations. When there are no checksums done, this could lead to silent data corruption.
[Fix]
This was fixed somewhere post-4.4. Testing identified b32bfa17246d ("i40e: Drop packet split receive routine") which is part of a broader refactor. My theory is that iommu exposes an issue in the packet split receive routine and so removing it is sufficient to prevent the problem from occurring.
[Test]
A user tested a Xenial 4.4 kernel with this patch applied and it fixed their issue - no data corruption was observed. (The test repeatedly deletes the apt cache and then does apt update.)
[Regression Potential]
It's a messy change inside i40e, so the risk is that i40e will be broken in some subtle way we haven't noticed, or have performance issues. None of these have been observed so far. |
A user reports that using an i40e with intel_iommu=on with the Xenial GA kernel causes data corruption. Using the Xenial HWE kernel or an out-of-tree driver more recent than the version shipped with Xenial solves the issue.
[Impact]
Corrupted data is returned from the network card intermittently. This is often noticeable when using apt, as the checksums are verified. If often leads to failure of apt operations. When there are no checksums done, this could lead to silent data corruption.
[Fix]
This was fixed somewhere post-4.4. Testing identified b32bfa17246d ("i40e: Drop packet split receive routine") which is part of a broader refactor. Picking this patch alone is sufficient to fix the issue. My theory is that iommu exposes an issue in the packet split receive routine and so removing it is sufficient to prevent the problem from occurring.
[Test]
A user tested a Xenial 4.4 kernel with this patch applied and it fixed their issue - no data corruption was observed. (The test repeatedly deletes the apt cache and then does apt update.)
[Regression Potential]
It's a messy change inside i40e, so the risk is that i40e will be broken in some subtle way we haven't noticed, or have performance issues. None of these have been observed so far. |
|
2018-11-09 09:51:33 |
Mauricio Faria de Oliveira |
bug |
|
|
added subscriber Mauricio Faria de Oliveira |
2018-11-09 16:56:36 |
Kleber Sacilotto de Souza |
nominated for series |
|
Ubuntu Xenial |
|
2018-11-09 16:56:36 |
Kleber Sacilotto de Souza |
bug task added |
|
linux (Ubuntu Xenial) |
|
2018-11-09 16:57:18 |
Kleber Sacilotto de Souza |
linux (Ubuntu Xenial): status |
New |
In Progress |
|
2019-01-08 04:45:26 |
Khaled El Mously |
linux (Ubuntu Xenial): status |
In Progress |
Fix Committed |
|
2019-01-17 14:22:05 |
Brad Figg |
tags |
|
verification-needed-xenial |
|
2019-01-23 03:20:50 |
Daniel Axtens |
tags |
verification-needed-xenial |
verification-done-xenial |
|
2019-02-04 08:47:55 |
Launchpad Janitor |
linux (Ubuntu Xenial): status |
Fix Committed |
Fix Released |
|
2019-02-04 08:47:55 |
Launchpad Janitor |
cve linked |
|
2000-1134 |
|
2019-02-04 08:47:55 |
Launchpad Janitor |
cve linked |
|
2007-3852 |
|
2019-02-04 08:47:55 |
Launchpad Janitor |
cve linked |
|
2008-0525 |
|
2019-02-04 08:47:55 |
Launchpad Janitor |
cve linked |
|
2009-0416 |
|
2019-02-04 08:47:55 |
Launchpad Janitor |
cve linked |
|
2011-4834 |
|
2019-02-04 08:47:55 |
Launchpad Janitor |
cve linked |
|
2015-1838 |
|
2019-02-04 08:47:55 |
Launchpad Janitor |
cve linked |
|
2015-7442 |
|
2019-02-04 08:47:55 |
Launchpad Janitor |
cve linked |
|
2016-7489 |
|
2019-02-04 08:47:55 |
Launchpad Janitor |
cve linked |
|
2017-5715 |
|
2019-02-04 08:47:55 |
Launchpad Janitor |
cve linked |
|
2018-19407 |
|
2019-07-24 21:30:09 |
Brad Figg |
tags |
verification-done-xenial |
cscc verification-done-xenial |
|