Your message dated Sun, 03 Dec 2023 20:48:02 +0000
with message-id <e1r9tni-009xpe...@fasolo.debian.org>
and subject line Bug#1032104: fixed in linux 6.6.4-1~exp1
has caused the Debian Bug report #1032104,
regarding linux: ppc64el iouring corrupted read
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1032104: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1032104
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: linux
Version: 5.10.0-21-powerpc64le
Severity: grave
Justification: causes non-serious data loss
X-Debbugs-Cc: dan...@mariadb.org

Dear Maintainer,

*** Reporter, please consider answering these questions, where appropriate ***

   * What led up to the situation?
   * What exactly did you do (or not do) that was effective (or
     ineffective)?
   * What was the outcome of this action?
   * What outcome did you expect instead?

*** End of the template - remove these template lines ***

>From https://jira.mariadb.org/browse/MDEV-30728

MariaDB's mtr tests on a number of specific tests depend on the correct
kernel operation.

As observed in these tests, there is a ~1/5 chance the
encryption.innodb_encryption test will read zeros on the later part of
the 16k pages that InnoDB uses by default.

This affects MariaDB-10.6+ packages where there is a liburing in the
distribution.

This has been observed in the CI of Debian
(https://ci.debian.net/packages/m/mariadb/testing/ppc64el/)
and upstreams https://buildbot.mariadb.org/#/builders/318.
The one ppc64le worker that has the Debian 5.10.0-21 kernel,
the same as the Debian CI, has the prefix ppc64le-db-bbw1-*.

Test faults occur on all MariaDB 10.6+ builds in containers on this kernel.
There a no faults on non-ppc64le or RHEL7/8 based ppc64le kernels.

To reproduce:

apt-get install mariadb-test
cd /usr/share/mysql/mysql-test
./mtr --mysqld=--innodb-flush-method=fsync --mysqld=--innodb-use-native-aio=1 
--vardir=/var/lib/mysql  --force encryption.innodb_encryption,innodb,undo0 
--repeat=12 

A test will frequenty fail.

2023-02-28  1:41:01 0 [ERROR] InnoDB: Database page corruption on disk or a 
failed read of file './ibdata1' page [page id: space=0, page number=282]. You 
may have to recover from a backup.

(the page number isn't predictable)

The complete mtr error log of mariadb server is $PWD/var/log/mysqld.1.err

I tested on tmpfs. This is a different fault from bug #1020831 as:
* there is no iouring error, just a bunch of zeros where data was
  expected.
* this is ppc64le only.

Note, more serious faults exist on overlayfs (MDEV-28751) and remote
filesystems so sticking to local xfs, ext4, btrfs is recommended.

-- System Information:
Debian Release: bullseye
  APT prefers jammy-updates
  APT policy: (500, 'jammy-updates'), (500, 'jammy-security'), (500, 'jammy'), 
(100, 'jammy-backports')
Architecture: ppc64el (ppc64le)

Kernel: Linux 5.10.0-21-powerpc64le (SMP w/128 CPU threads)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: unable to detect

--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 6.6.4-1~exp1
Done: Bastian Blank <wa...@debian.org>

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1032...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastian Blank <wa...@debian.org> (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sun, 03 Dec 2023 20:57:56 +0100
Source: linux
Architecture: source
Version: 6.6.4-1~exp1
Distribution: experimental
Urgency: medium
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Bastian Blank <wa...@debian.org>
Closes: 1032104 1037938
Changes:
 linux (6.6.4-1~exp1) experimental; urgency=medium
 .
   * New upstream stable update:
     https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.4
     - nvmet: nul-terminate the NQNs passed in the connect command
       (CVE-2023-6121)
 .
   [ Bastian Blank ]
   * Fix build dependency on rsync.
   * Fix build dependency on kernel-wedge.
   * udeb: Make i2c-hid modules optional.
 .
   [ Timothy Pearson ]
   * [powerpc] Don't clobber f0/vs0 during fp|altivec register save
     (Closes: #1032104)
 .
   [ Johannes Schauer Marin Rodrigues ]
   * Fix FTCBFS: Pass _PYTHON_SYSCONFIGDATA_NAME to the perf build.
     (Closes: #1037938) Thanks to Helmut Grohne for the patch.
Checksums-Sha1:
 bbef175fb0e0acdf376b47ead3e0b501b536b7ba 233463 linux_6.6.4-1~exp1.dsc
 b38f79198036fde7abf99f60ffba545b91cdf82c 142637188 linux_6.6.4.orig.tar.xz
 c9c7ff3da91737365776a70f2214444de0ce95b4 1558788 
linux_6.6.4-1~exp1.debian.tar.xz
 1af076e46f3dc867fca2e895233423b4839007d0 5930 
linux_6.6.4-1~exp1_source.buildinfo
Checksums-Sha256:
 b4f661d17aa7c10ed351b18fae004844a40cc8ba592f12fa6fe89f73d861846d 233463 
linux_6.6.4-1~exp1.dsc
 13cc9a0a341c415acc759d642ae43c39645d00531b44725486f077747237301f 142637188 
linux_6.6.4.orig.tar.xz
 c2a55c3f2aa20e85c4e2f4e42f0ef30e4509bb372fa49d8d9e64cd9893c7c391 1558788 
linux_6.6.4-1~exp1.debian.tar.xz
 993b2f9fca42146cb58df83feb8d22cfccb8617a96e3b6e6d07d8f375154b1bc 5930 
linux_6.6.4-1~exp1_source.buildinfo
Files:
 7d79fb0706acad7ec6db8ba7c4facd38 233463 kernel optional linux_6.6.4-1~exp1.dsc
 0203020079fe29e661809eeee5280e7e 142637188 kernel optional 
linux_6.6.4.orig.tar.xz
 408e780433e84019f962a1380f0a1f7b 1558788 kernel optional 
linux_6.6.4-1~exp1.debian.tar.xz
 f8bf11b8f04e3e6c5751a2b62111c644 5930 kernel optional 
linux_6.6.4-1~exp1_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iHUEARYIAB0WIQQ8pEKDNIgQDAQDOBFji0aBW7swjwUCZWzfQwAKCRBji0aBW7sw
j/hWAQDzAKGYNrjDHiGdhJnuoRH35w9VE7K5sW4m+KvbBq0qhwEAydEdh34ZpQAB
izRCFMEFyNzZY2J4b0Wup8D2z9FOaQA=
=vYsM
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to