Bug 2183556
Summary: | dm: discard IOs on striped or snap LVs can trigger data corruption [RHEL-9.3] | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 9 | Reporter: | Ben Marzinski <bmarzins> | ||||
Component: | kernel | Assignee: | Ben Marzinski <bmarzins> | ||||
kernel sub component: | Device Mapper | QA Contact: | Filip Suba <fsuba> | ||||
Status: | CLOSED ERRATA | Docs Contact: | |||||
Severity: | high | ||||||
Priority: | high | CC: | agk, fsuba, msnitzer, nweddle, vdo-internal | ||||
Version: | 9.1 | Keywords: | Regression, Triaged | ||||
Target Milestone: | rc | ||||||
Target Release: | --- | ||||||
Hardware: | Unspecified | ||||||
OS: | Unspecified | ||||||
Whiteboard: | |||||||
Fixed In Version: | kernel-5.14.0-304.el9 | Doc Type: | If docs needed, set a value | ||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | |||||||
: | 2183559 2184420 2184429 (view as bug list) | Environment: | |||||
Last Closed: | 2023-11-07 08:43:49 UTC | Type: | Bug | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | |||||||
Bug Blocks: | 2183559, 2184420, 2184429 | ||||||
Attachments: |
|
Description
Ben Marzinski
2023-03-31 15:29:38 UTC
The fix for this issue is in the following linux-dm commits: f7b58a69fad9 dm: fix improper splitting for abnormal bios 666eed46769d dm: fix __send_duplicate_bios() to always allow for splitting IO The upstream kernel bug for this issue is here: https://bugzilla.kernel.org/show_bug.cgi?id=217273 Created attachment 1954924 [details]
reproducer script
Moving zstream request to rhel-8.2 version of this bug, bz 2184420. Verified with kernel-5.14.0-304.el9. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Important: kernel security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2023:6583 |