[Bug 1364091] Re: Possible RAID-6 corruption

2014-10-28 Thread Joseph Salisbury
** Tags removed: kernel-key -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1364091 Title: Possible RAID-6 corruption To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+

Re: [Bug 1364091] Re: Possible RAID-6 corruption

2014-10-05 Thread Seth Forshee
On Sun, Oct 05, 2014 at 03:00:18PM -, RoyK wrote: > According to the article at http://lwn.net/Articles/608896/, this bug > shouldn't need fixing in handle_stripe5(), only in handle_stripe6(), but > then again, I don't know the code. Hmm. I interpreted the comment to mean that backports to old

[Bug 1364091] Re: Possible RAID-6 corruption

2014-10-05 Thread RoyK
According to the article at http://lwn.net/Articles/608896/, this bug shouldn't need fixing in handle_stripe5(), only in handle_stripe6(), but then again, I don't know the code. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://b

[Bug 1364091] Re: Possible RAID-6 corruption

2014-10-03 Thread Seth Forshee
Here's my backport for lucid. I don't have any advice for reproducing the problem; I'd have to look at the code in more detail and try to figure out what triggers that condition. ** Patch added: "0001-md-raid6-avoid-data-corruption-during-recovery-of-do.patch" https://bugs.launchpad.net/ubunt

[Bug 1364091] Re: Possible RAID-6 corruption

2014-10-03 Thread RoyK
I looked at the code in 2.6.32 and I can't find the related bits in handle_stripe6(). The prexor int isn't defined, and the checks after set_bit(R5_Wantwrite, &dev->flags); aren't issued. I don't know enouch about this code to see what's going on. I'm also not sure what really triggers this bug. I

Re: [Bug 1364091] Re: Possible RAID-6 corruption

2014-10-02 Thread Seth Forshee
On Thu, Oct 02, 2014 at 06:58:14PM -, RoyK wrote: > seems to me this is rather a small fix and also urgent. > > when will the next 2.6.32 release appear? I can't say, that's not under my control. The reason I'm reluctant is that the code being patched is different in 2.6.32, split out into s

[Bug 1364091] Re: Possible RAID-6 corruption

2014-10-02 Thread RoyK
seems to me this is rather a small fix and also urgent. when will the next 2.6.32 release appear? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1364091 Title: Possible RAID-6 corruption To manage

Re: [Bug 1364091] Re: Possible RAID-6 corruption

2014-10-02 Thread Seth Forshee
On Thu, Oct 02, 2014 at 11:10:39AM -, RoyK wrote: > Even if no bugs has been filed for lucid, I guess this should be fixed > there as well. A double disk failure in RAID-6 isn't very common, and > corruptions may not be easily detected. AFAICS the issue is also in the > lucid kernel, but then,

[Bug 1364091] Re: Possible RAID-6 corruption

2014-10-02 Thread RoyK
Even if no bugs has been filed for lucid, I guess this should be fixed there as well. A double disk failure in RAID-6 isn't very common, and corruptions may not be easily detected. AFAICS the issue is also in the lucid kernel, but then, it's just another 6 months before lucid is EOL :P -- You rec

[Bug 1364091] Re: Possible RAID-6 corruption

2014-10-01 Thread Seth Forshee
RoyK: Okay, so it turns out we already have this patch in the precise and utopic trees from upstream stable, and it's on its way to trusty via upstream stable. That only leaves lucid, which should also receive this fix via upstream stable in the future. 2.6.32 requires a backport which I'm unequip

[Bug 1364091] Re: Possible RAID-6 corruption

2014-10-01 Thread Seth Forshee
On Wed, Oct 01, 2014 at 02:05:14PM -, swmike wrote: > Great, but what about the kernels for older LTS releases still under > support? Neil stated this affects all kernels back to and including > 2.6.32. So I imagine 12.04 LTS and 10.04 LTS are also affected. All supported stable kernels should

[Bug 1364091] Re: Possible RAID-6 corruption

2014-10-01 Thread swmike
Great, but what about the kernels for older LTS releases still under support? Neil stated this affects all kernels back to and including 2.6.32. So I imagine 12.04 LTS and 10.04 LTS are also affected. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscrib

[Bug 1364091] Re: Possible RAID-6 corruption

2014-10-01 Thread Seth Forshee
The fix is 9c4bdf697c39805078392d5ddbbba5ae5680e0dd in Linus's tree, which is already out for review for the next 3.13.x.y release. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1364091 Title: Possi

[Bug 1364091] Re: Possible RAID-6 corruption

2014-09-30 Thread Joseph Salisbury
** Changed in: linux (Ubuntu) Importance: Undecided => High ** Tags added: kernel-key ** Changed in: linux (Ubuntu) Status: Confirmed => Triaged -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bug

[Bug 1364091] Re: Possible RAID-6 corruption

2014-09-30 Thread Brian Murray
** Package changed: linux-kernel (Ubuntu) => linux (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1364091 Title: Possible RAID-6 corruption To manage notifications about this bug go to: htt

[Bug 1364091] Re: Possible RAID-6 corruption

2014-09-28 Thread RoyK
This fix is already in newer kernel versions - a two line fix, anyone? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1364091 Title: Possible RAID-6 corruption To manage notifications about this bug

[Bug 1364091] Re: Possible RAID-6 corruption

2014-09-22 Thread Ubuntu Foundations Team Bug Bot
The attachment "Patch copy/pasted from Linux-raid mailing list" seems to be a patch. If it isn't, please remove the "patch" flag from the attachment, remove the "patch" tag, and if you are a member of the ~ubuntu-reviewers, unsubscribe the team. [This is an automated message performed by a Launch

[Bug 1364091] Re: Possible RAID-6 corruption

2014-09-21 Thread swmike
diff --git a/drivers/md/raid5.c b/drivers/md/raid5.c index 6b2d615d1094..183588b11fc1 100644 --- a/drivers/md/raid5.c +++ b/drivers/md/raid5.c @@ -3817,6 +3817,8 @@ static void handle_stripe(struct stripe_head *sh) set_bit(R5_Wantwrite, &dev->flags);

[Bug 1364091] Re: Possible RAID-6 corruption

2014-09-21 Thread swmike
** Attachment added: "Patch copy/pasted from Linux-raid mailing list" https://bugs.launchpad.net/ubuntu/+source/linux-kernel/+bug/1364091/+attachment/4211109/+files/patch-6b2d615d1094183588b11fc1.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subsc

[Bug 1364091] Re: Possible RAID-6 corruption

2014-09-21 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: linux-kernel (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1364091 Title:

[Bug 1364091] Re: Possible RAID-6 corruption

2014-09-21 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: mdadm (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1364091 Title: Poss

[Bug 1364091] Re: Possible RAID-6 corruption

2014-09-21 Thread swmike
This problem affects all stable kernels from 2.6.32 and onwards, and this patch needs to be applied to ALL kernels from that date to avoid data corruption on double degraded RAID-6 volumes being written to. This is not an mdadm problem, it's a kernel problem. ** Also affects: linux-kernel (Ubuntu