Bug 169992
Summary: | LTC18779-Lost dirty bit in kernel memory managment [PATCH] | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 3 | Reporter: | Issue Tracker <tao> | ||||
Component: | kernel | Assignee: | Jan Glauber <jglauber> | ||||
Status: | CLOSED ERRATA | QA Contact: | Brian Brock <bbrock> | ||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | 3.0 | CC: | petrides, tao | ||||
Target Milestone: | --- | ||||||
Target Release: | --- | ||||||
Hardware: | s390 | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | RHSA-2006-0144 | Doc Type: | Bug Fix | ||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2006-03-15 16:44:38 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | |||||||
Bug Blocks: | 168424 | ||||||
Attachments: |
|
Description
Issue Tracker
2005-10-06 09:03:33 UTC
Created attachment 119661 [details]
proposed patch
Symptom: Data corruption under memory pressure. Problem: The hardware dirty bit is cleared every time SetPageUptodate is called. The common memory management code calls the function even if the page already is up to date. In this case the dirty bit may not be cleared because the page is potentially mapped writable in some user process which could have written to the page since the last writeback. Solution: Add a check to arch_set_page_uptodate to skip the clearing of the dirty bit, if the page is already up to date. Created an attachment (id=12671) linux-2.4.21-s390-dirty_bit_fix.patch This patch should go into the next update (U7) since it fixes a potential data corruption. Created attachment 120565 [details]
linux-2.4.21-s390-dirty_bit_fix.patch
Once again mirroring did ignore an attachment...
A fix for this problem has just been committed to the RHEL3 U7 patch pool this evening (in kernel version 2.4.21-37.10.EL). An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2006-0144.html |