Your message dated Thu, 24 May 2007 21:27:01 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#404148: fixed in linux-2.6 2.6.18.dfsg.1-13lenny1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: kernel
Severity: critical
Justification: causes serious data loss

Hi everybody.

I'm currently (together with others) investigating in a severe data
corruption problem that at least many users might suffer from.

A short description, when you validate lots of GBs over and over with
md5sums (or another hash) there are errors found.

We do not yet know the real reson for the problems but it might relate
to Opteron (and perhaps Athlon) CPUs and/or Nvidia chipsets (mainboard).
So it might be a hardware design error (but even a kernel error could be
possible).
This is definitely not a single hardware issue of my system as many
other users on lkml reported the problem (and we all did very extensive
hardware tests).

The error occurs only if on has so much memory that the system uses
memory mapping (and the hardware iommu).
At lkml we currently found two "solutions" (I consider them more
workarounds, as we don't know exactly why they're solving the problem):
1) Disabling memory hole mapping in the system BIOS. The downside is
that there is no memory hole mapping at all, and the users looses much
of his main memory (in my case 1,5 GB)
2) Setting iommu=soft. The users keeps it full memory, and in all our
tests (at least as far as I am informed), and we do very much tests as I
and someone else administer some big linux clusters,... the error did
_not_ occur.

Windows users do generally not suffer from this corruption, as Windows
(at least until Vista) was not able to make use of the hardware iommu,
and always uses the software iommu.
The Intel CPUs with EMT64/Intel64 don't suffer from that problem either,
as they don't have an hwiommu, too (at least as far as I know).

We are not yet sure if this is a large scale problem or affects only
some special hardware combinations. We do however think that the issue
occurs only with PCI-DMA accesses. (Tests showed, that when disabling
dma or at least using slower dma modes on the disks, the issue disappeared).
The problem is vendors (at least Nvidia) does not help very much, they
even didn't answer my mails.
And most "normal" users won't recognise this problem, as they don't have
enought main memory and even it they have the error occurs very rarely
(perhaps some 100 bytes every 30 GB <- only a very imprecise scale).

What I suggest know:
As this is a very grave I suggest

- to configure all the default kernels for etch that may be affected (as
far as I know that are the amd64-k8 and amd64-generic kernels. Perhaps
the i386 packages too, have a look at lkml for this) to use iommu=soft.
- to update all packages in sarge and woody (as far as they might be
affected)
- put some warnings in the packages where users might configure their
own kernel and the boot-loaders.

Have a look at this thread at lkml
http://marc.theaimsgroup.com/?t=116502121800001&r=1&w=2 for in-depth
information.
It also contains links to some previous threads. There are also some
posts to lkml about this topics in separate threads (e.g. "amd64 iommu
causing corruption? (was Re: data corruption with nvidia chipsets and
IDE/SATA drives // memory hole mapping related bug?!)").

Best wishes,
Chris.

btw: please CC me as I'm off-list at the moment.
PS: I'll also write this the debian-kernel mailinglist.



-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/dash
Kernel: Linux 2.6.18
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=UTF-8)


begin:vcard
fn:Mitterer, Christoph Anton
n:Mitterer;Christoph Anton
email;internet:[EMAIL PROTECTED]
x-mozilla-html:TRUE
version:2.1
end:vcard


--- End Message ---
--- Begin Message ---
Source: linux-2.6
Source-Version: 2.6.18.dfsg.1-13lenny1

We believe that the bug you reported is fixed in the latest version of
linux-2.6, which is due to be installed in the Debian FTP archive:

linux-2.6_2.6.18.dfsg.1-13lenny1.diff.gz
  to pool/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-13lenny1.diff.gz
linux-2.6_2.6.18.dfsg.1-13lenny1.dsc
  to pool/main/l/linux-2.6/linux-2.6_2.6.18.dfsg.1-13lenny1.dsc
linux-doc-2.6.18_2.6.18.dfsg.1-13lenny1_all.deb
  to pool/main/l/linux-2.6/linux-doc-2.6.18_2.6.18.dfsg.1-13lenny1_all.deb
linux-headers-2.6.18-5-all-sparc_2.6.18.dfsg.1-13lenny1_sparc.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.18-5-all-sparc_2.6.18.dfsg.1-13lenny1_sparc.deb
linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13lenny1_sparc.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13lenny1_sparc.deb
linux-headers-2.6.18-5-sparc32_2.6.18.dfsg.1-13lenny1_sparc.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.18-5-sparc32_2.6.18.dfsg.1-13lenny1_sparc.deb
linux-headers-2.6.18-5-sparc64-smp_2.6.18.dfsg.1-13lenny1_sparc.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.18-5-sparc64-smp_2.6.18.dfsg.1-13lenny1_sparc.deb
linux-headers-2.6.18-5-sparc64_2.6.18.dfsg.1-13lenny1_sparc.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.18-5-sparc64_2.6.18.dfsg.1-13lenny1_sparc.deb
linux-headers-2.6.18-5-vserver-sparc64_2.6.18.dfsg.1-13lenny1_sparc.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.18-5-vserver-sparc64_2.6.18.dfsg.1-13lenny1_sparc.deb
linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13lenny1_sparc.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13lenny1_sparc.deb
linux-headers-2.6.18-5_2.6.18.dfsg.1-13lenny1_sparc.deb
  to 
pool/main/l/linux-2.6/linux-headers-2.6.18-5_2.6.18.dfsg.1-13lenny1_sparc.deb
linux-image-2.6.18-5-sparc32_2.6.18.dfsg.1-13lenny1_sparc.deb
  to 
pool/main/l/linux-2.6/linux-image-2.6.18-5-sparc32_2.6.18.dfsg.1-13lenny1_sparc.deb
linux-image-2.6.18-5-sparc64-smp_2.6.18.dfsg.1-13lenny1_sparc.deb
  to 
pool/main/l/linux-2.6/linux-image-2.6.18-5-sparc64-smp_2.6.18.dfsg.1-13lenny1_sparc.deb
linux-image-2.6.18-5-sparc64_2.6.18.dfsg.1-13lenny1_sparc.deb
  to 
pool/main/l/linux-2.6/linux-image-2.6.18-5-sparc64_2.6.18.dfsg.1-13lenny1_sparc.deb
linux-image-2.6.18-5-vserver-sparc64_2.6.18.dfsg.1-13lenny1_sparc.deb
  to 
pool/main/l/linux-2.6/linux-image-2.6.18-5-vserver-sparc64_2.6.18.dfsg.1-13lenny1_sparc.deb
linux-manual-2.6.18_2.6.18.dfsg.1-13lenny1_all.deb
  to pool/main/l/linux-2.6/linux-manual-2.6.18_2.6.18.dfsg.1-13lenny1_all.deb
linux-patch-debian-2.6.18_2.6.18.dfsg.1-13lenny1_all.deb
  to 
pool/main/l/linux-2.6/linux-patch-debian-2.6.18_2.6.18.dfsg.1-13lenny1_all.deb
linux-source-2.6.18_2.6.18.dfsg.1-13lenny1_all.deb
  to pool/main/l/linux-2.6/linux-source-2.6.18_2.6.18.dfsg.1-13lenny1_all.deb
linux-support-2.6.18-5_2.6.18.dfsg.1-13lenny1_all.deb
  to pool/main/l/linux-2.6/linux-support-2.6.18-5_2.6.18.dfsg.1-13lenny1_all.deb
linux-tree-2.6.18_2.6.18.dfsg.1-13lenny1_all.deb
  to pool/main/l/linux-2.6/linux-tree-2.6.18_2.6.18.dfsg.1-13lenny1_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
dann frazier <[EMAIL PROTECTED]> (supplier of updated linux-2.6 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Mon, 21 May 2007 14:45:13 -0600
Source: linux-2.6
Binary: linux-image-2.6.18-5-s3c2410 linux-headers-2.6.18-5-all-s390 
linux-headers-2.6.18-5-all-m68k linux-headers-2.6.18-5-xen-amd64 
linux-image-2.6.18-5-iop32x linux-headers-2.6.18-5-all-alpha 
linux-image-2.6.18-5-r5k-cobalt linux-image-2.6.18-5-r5k-ip32 
linux-headers-2.6.18-5-vserver-686 linux-headers-2.6.18-5-xen-vserver 
xen-linux-system-2.6.18-5-xen-686 linux-image-2.6.18-5-xen-amd64 
linux-image-2.6.18-5-powerpc xen-linux-system-2.6.18-5-xen-vserver-686 
linux-image-2.6.18-5-atari linux-headers-2.6.18-5-r3k-kn02 
linux-headers-2.6.18-5-xen-vserver-amd64 linux-image-2.6.18-5-xen-vserver-686 
linux-image-2.6.18-5-rpc linux-image-2.6.18-5-xen-686 
linux-headers-2.6.18-5-vserver-s390x linux-image-2.6.18-5-parisc64-smp 
linux-headers-2.6.18-5-parisc64 linux-image-2.6.18-5-r4k-ip22 
linux-headers-2.6.18-5 linux-headers-2.6.18-5-r5k-ip32 
linux-headers-2.6.18-5-r5k-cobalt linux-headers-2.6.18-5-all-mipsel 
linux-headers-2.6.18-5-486 linux-headers-2.6.18-5-footbridge 
linux-image-2.6.18-5-vserver-powerpc64 linux-manual-2.6.18 
linux-image-2.6.18-5-xen-vserver-amd64 linux-image-2.6.18-5-vserver-sparc64 
linux-headers-2.6.18-5-vserver-k7 linux-headers-2.6.18-5-mckinley 
linux-headers-2.6.18-5-alpha-legacy linux-image-2.6.18-5-parisc-smp 
linux-headers-2.6.18-5-vserver linux-headers-2.6.18-5-xen 
linux-headers-2.6.18-5-rpc linux-modules-2.6.18-5-xen-686 
linux-headers-2.6.18-5-k7 linux-image-2.6.18-5-r3k-kn02 
linux-headers-2.6.18-5-qemu linux-headers-2.6.18-5-vserver-powerpc 
linux-headers-2.6.18-5-all-sparc linux-headers-2.6.18-5-alpha-smp 
linux-image-2.6.18-5-vserver-s390x linux-image-2.6.18-5-vserver-alpha 
linux-image-2.6.18-5-vserver-amd64 linux-headers-2.6.18-5-all-powerpc 
linux-headers-2.6.18-5-iop32x linux-image-2.6.18-5-footbridge 
linux-image-2.6.18-5-prep linux-headers-2.6.18-5-all-amd64 
linux-image-2.6.18-5-powerpc64 linux-image-2.6.18-5-sb1a-bcm91480b 
linux-image-2.6.18-5-powerpc-smp linux-headers-2.6.18-5-all-arm 
linux-headers-2.6.18-5-itanium linux-headers-2.6.18-5-amd64 
linux-image-2.6.18-5-powerpc-miboot xen-linux-system-2.6.18-5-xen-vserver-amd64 
linux-headers-2.6.18-5-686-bigmem linux-headers-2.6.18-5-prep 
linux-headers-2.6.18-5-parisc-smp linux-headers-2.6.18-5-powerpc-miboot 
linux-headers-2.6.18-5-powerpc64 linux-image-2.6.18-5-vserver-k7 
linux-headers-2.6.18-5-vserver-powerpc64 linux-image-2.6.18-5-alpha-smp 
linux-image-2.6.18-5-486 linux-headers-2.6.18-5-s390x 
linux-image-2.6.18-5-itanium linux-image-2.6.18-5-686-bigmem 
linux-headers-2.6.18-5-s390 linux-headers-2.6.18-5-mac 
linux-headers-2.6.18-5-xen-vserver-686 linux-doc-2.6.18 
linux-headers-2.6.18-5-sparc64 linux-image-2.6.18-5-parisc64 
linux-headers-2.6.18-5-all-i386 linux-headers-2.6.18-5-powerpc-smp 
linux-image-2.6.18-5-s390 linux-image-2.6.18-5-s390-tape 
linux-image-2.6.18-5-vserver-powerpc linux-headers-2.6.18-5-parisc 
linux-headers-2.6.18-5-xen-686 linux-headers-2.6.18-5-sparc64-smp 
linux-headers-2.6.18-5-686 linux-source-2.6.18 
linux-headers-2.6.18-5-vserver-alpha linux-image-2.6.18-5-alpha-legacy 
linux-headers-2.6.18-5-sb1-bcm91250a linux-headers-2.6.18-5-ixp4xx 
linux-image-2.6.18-5-amiga linux-image-2.6.18-5-alpha-generic 
linux-modules-2.6.18-5-xen-vserver-686 linux-modules-2.6.18-5-xen-vserver-amd64 
linux-image-2.6.18-5-r4k-kn04 linux-image-2.6.18-5-amd64 
linux-headers-2.6.18-5-parisc64-smp linux-headers-2.6.18-5-powerpc 
linux-image-2.6.18-5-ixp4xx linux-image-2.6.18-5-parisc linux-support-2.6.18-5 
linux-image-2.6.18-5-sparc64 linux-image-2.6.18-5-mac 
linux-headers-2.6.18-5-sparc32 linux-image-2.6.18-5-sparc64-smp 
linux-image-2.6.18-5-686 linux-headers-2.6.18-5-alpha-generic 
linux-headers-2.6.18-5-sb1a-bcm91480b linux-image-2.6.18-5-sb1-bcm91250a 
linux-headers-2.6.18-5-r4k-ip22 linux-image-2.6.18-5-s390x 
linux-patch-debian-2.6.18 xen-linux-system-2.6.18-5-xen-amd64 
linux-headers-2.6.18-5-all-ia64 linux-headers-2.6.18-5-vserver-amd64 
linux-headers-2.6.18-5-atari linux-image-2.6.18-5-vserver-686 linux-tree-2.6.18 
linux-headers-2.6.18-5-amiga linux-image-2.6.18-5-sparc32 
linux-headers-2.6.18-5-all-hppa linux-headers-2.6.18-5-s3c2410 
linux-image-2.6.18-5-qemu linux-headers-2.6.18-5-r4k-kn04 
linux-image-2.6.18-5-k7 linux-image-2.6.18-5-mckinley 
linux-headers-2.6.18-5-all linux-headers-2.6.18-5-all-mips 
linux-headers-2.6.18-5-vserver-sparc64 linux-modules-2.6.18-5-xen-amd64
Architecture: source sparc all
Version: 2.6.18.dfsg.1-13lenny1
Distribution: testing
Urgency: high
Maintainer: Debian Kernel Team <[email protected]>
Changed-By: dann frazier <[EMAIL PROTECTED]>
Description: 
 linux-doc-2.6.18 - Linux kernel specific documentation for version 2.6.18
 linux-headers-2.6.18-5 - Common header files for Linux 2.6.18
 linux-headers-2.6.18-5-all - All header files for Linux 2.6.18
 linux-headers-2.6.18-5-all-sparc - All header files for Linux 2.6.18
 linux-headers-2.6.18-5-sparc32 - Header files for Linux 2.6.18 on uniprocessor 
sparc32 (sun4m)
 linux-headers-2.6.18-5-sparc64 - Header files for Linux 2.6.18 on uniprocessor 
64-bit UltraSPARC
 linux-headers-2.6.18-5-sparc64-smp - Header files for Linux 2.6.18 on 
multiprocessor 64-bit UltraSPARC
 linux-headers-2.6.18-5-vserver - Common header files for Linux 2.6.18
 linux-headers-2.6.18-5-vserver-sparc64 - Header files for Linux 2.6.18 on 
uniprocessor 64-bit UltraSPARC
 linux-image-2.6.18-5-sparc32 - Linux 2.6.18 image on uniprocessor sparc32 
(sun4m)
 linux-image-2.6.18-5-sparc64 - Linux 2.6.18 image on uniprocessor 64-bit 
UltraSPARC
 linux-image-2.6.18-5-sparc64-smp - Linux 2.6.18 image on multiprocessor 64-bit 
UltraSPARC
 linux-image-2.6.18-5-vserver-sparc64 - Linux 2.6.18 image on uniprocessor 
64-bit UltraSPARC
 linux-manual-2.6.18 - Linux kernel API manual pages for version 2.6.18
 linux-patch-debian-2.6.18 - Debian patches to version 2.6.18 of the Linux 
kernel
 linux-source-2.6.18 - Linux kernel source for version 2.6.18 with Debian 
patches
 linux-support-2.6.18-5 - Support files for Linux 2.6.18
 linux-tree-2.6.18 - Linux kernel source tree for building Debian kernel images
Closes: 404148 406111 412092 412132 412957 417629 417631 418076 418344 421281 
421283
Changes: 
 linux-2.6 (2.6.18.dfsg.1-13lenny1) testing; urgency=high
 .
   [ Bastian Blank ]
   * [vserver] Fix overflow in network accounting. (closes: #412132)
   * [vserver] Fix lock accounting. (closes: #417631)
   * Bump ABI to 5.
   * Make modules packages binnmuable.
   * [sparc] Enable Qlogic QLA SCSI support. (closes: #417629)
 .
   [ dann frazier ]
   * bugfix/listxattr-mem-corruption.patch
     [SECURITY] Fix userspace corruption vulnerability caused by
     incorrectly promoted return values in bad_inode_ops
     This patch changes the kernel ABI.
     See CVE-2006-5753
   * bugfix/all/vserver/net-mount-fix.patch
     Fix mounting of network filesystems with VX_BINARY_MOUNT caps
     (closes: #418076)
   * Disable broken CONFIG_IP_ROUTE_MULTIPATH_CACHED setting. (closes: #418344)
   * bugfix/ipv6-disallow-RH0-by-default.patch
     [SECURITY] Avoid a remote DoS (network amplification between two routers)
     by disabling type0 IPv6 route headers by default. Can be re-enabled via
     a sysctl interface. Thanks to Vlad Yasevich for porting help.
     This patch changes the kernel ABI.
     See CVE-2007-2242
   * Fix an oops which potentially results in data corruption in the gdth 
driver.
     (closes: #412092)
   * bugfix/amd64-make-gart-ptes-uncacheable.patch
     Fix silent data corruption using GART iommu (closes: #404148)
 .
   [ maximilian attems ]
   * Backport support for i965 to agp too. (closes: #406111)
   * Compile fix for UML CONFIG_MODE_TT=y. (closes: #412957)
   * Fix ide-generic jmicron device conflict. (closes: #421281)
 .
   [ Martin Michlmayr ]
   * Fix wrong checksum for split TCP packets on 64-bit MIPS. (closes: #421283)
Files: 
 75b3eedcb9d253cb14ee6e22415a85d2 5674 devel optional 
linux-2.6_2.6.18.dfsg.1-13lenny1.dsc
 50f9fc5a75b90e1e0194c14787b26ab8 5340591 devel optional 
linux-2.6_2.6.18.dfsg.1-13lenny1.diff.gz
 40287b4620d6656dec80f556942dbd7d 3607830 doc optional 
linux-doc-2.6.18_2.6.18.dfsg.1-13lenny1_all.deb
 9ceb3cf71ac8911f1538ee798ffd00d4 1074954 doc optional 
linux-manual-2.6.18_2.6.18.dfsg.1-13lenny1_all.deb
 7b7e7688ce2abcda7bbb9f2b7543b9c3 1463480 devel optional 
linux-patch-debian-2.6.18_2.6.18.dfsg.1-13lenny1_all.deb
 facab9e65a6b0697a423e8d7ea9a0b88 41417006 devel optional 
linux-source-2.6.18_2.6.18.dfsg.1-13lenny1_all.deb
 c0f46792d9ac92fb29090750c9219813 3778224 devel optional 
linux-support-2.6.18-5_2.6.18.dfsg.1-13lenny1_all.deb
 c44840bb6e73f5c9ddd22e3c1260cf5d 50604 devel optional 
linux-tree-2.6.18_2.6.18.dfsg.1-13lenny1_all.deb
 e69bc01913512b12c394e250a2886b09 50158 devel optional 
linux-headers-2.6.18-5-all_2.6.18.dfsg.1-13lenny1_sparc.deb
 405fba716c6668c1c270e3927b368d49 50184 devel optional 
linux-headers-2.6.18-5-all-sparc_2.6.18.dfsg.1-13lenny1_sparc.deb
 0335b2e1f02717173615c404643557a0 3163976 devel optional 
linux-headers-2.6.18-5_2.6.18.dfsg.1-13lenny1_sparc.deb
 57dbdfef212c4615f25899619d677009 6405798 admin optional 
linux-image-2.6.18-5-sparc32_2.6.18.dfsg.1-13lenny1_sparc.deb
 488f882e0f5fa2a6f2c48729b6940a0f 161350 devel optional 
linux-headers-2.6.18-5-sparc32_2.6.18.dfsg.1-13lenny1_sparc.deb
 8908e58175418d49878e124867f295f0 10349990 admin optional 
linux-image-2.6.18-5-sparc64_2.6.18.dfsg.1-13lenny1_sparc.deb
 2c9ac125555eb765e9ac375c42837df3 190578 devel optional 
linux-headers-2.6.18-5-sparc64_2.6.18.dfsg.1-13lenny1_sparc.deb
 fc18cd6f7d253abc261c2dae3ed4ca69 10610136 admin optional 
linux-image-2.6.18-5-sparc64-smp_2.6.18.dfsg.1-13lenny1_sparc.deb
 9db2ee3fd2255dff61e678a13c618542 191332 devel optional 
linux-headers-2.6.18-5-sparc64-smp_2.6.18.dfsg.1-13lenny1_sparc.deb
 867dba2493174c01845d3cdb3cd72d08 3186426 devel optional 
linux-headers-2.6.18-5-vserver_2.6.18.dfsg.1-13lenny1_sparc.deb
 28fcbe57e864862729eac4f2a0f1073d 10656456 admin optional 
linux-image-2.6.18-5-vserver-sparc64_2.6.18.dfsg.1-13lenny1_sparc.deb
 5b6ef42a31830a8629bcd1902be494d3 191748 devel optional 
linux-headers-2.6.18-5-vserver-sparc64_2.6.18.dfsg.1-13lenny1_sparc.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGVKF/huANDBmkLRkRArIfAJ9fqjosutZ4/1wMHF7i3ryC5ylJagCfVYgm
da1GVhG5unx1JV5h0WovvBs=
=S1AY
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to