Bug 2179342
Summary: | kernel: general protection fault, probably for non-canonical address PREEMPT SMP PT | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 9 | Reporter: | Jeff Layton <jlayton> |
Component: | kernel | Assignee: | Jeff Layton <jlayton> |
kernel sub component: | NFS | QA Contact: | Zhi Li <yieli> |
Status: | CLOSED ERRATA | Docs Contact: | |
Severity: | high | ||
Priority: | unspecified | CC: | acaringi, adscvr, airlied, alciregi, bcodding, bskeggs, chuck.lever, dcritch, dhowells, d.lesca, dr.diesel, dwysocha, edgar.hoch, exarkun, extras-qa, gnafu_the_great, hdegoede, hpa, jarodwilson, jglisse, jiyin, jlayton, josef, kernel-maint, lgoncalv, linville, masami256, mchehab, nfs-team, ptalbert, pvlasin, samuel-rhbugs, steved, trevor.hemsley, xzhou, yieli, yoyang |
Version: | 9.2 | Keywords: | Regression, Triaged |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | kernel-5.14.0-284.6.1.el9_2 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | 2150630 | Environment: | |
Last Closed: | 2023-05-09 08:13:53 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2150630 | ||
Bug Blocks: |
Description
Jeff Layton
2023-03-17 13:16:57 UTC
Justification: A rather nasty memory corruption bug in nfsd's splice read code has been taken into RHEL9.2. If we don't take the fix for this, then anyone running an NFS server with 9.2 kernels could end up crashing when trying to service client read requests. Sanity testing this issue based on comment#22, Move status to VERIFIED. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Important: kernel security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2023:2458 |