Bug 439917
Summary: | kernel: splice: fix bad unlock_page() in error case [rhel-5.3] | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 5 | Reporter: | Greg Marsden <greg.marsden> | ||||||
Component: | kernel | Assignee: | Larry Woodman <lwoodman> | ||||||
Status: | CLOSED ERRATA | QA Contact: | Martin Jenner <mjenner> | ||||||
Severity: | high | Docs Contact: | |||||||
Priority: | high | ||||||||
Version: | 5.3 | CC: | dzickus, jmoyer, lwang, mjc, pbenas, qcai | ||||||
Target Milestone: | rc | Keywords: | Security | ||||||
Target Release: | --- | ||||||||
Hardware: | All | ||||||||
OS: | Linux | ||||||||
Whiteboard: | |||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||
Doc Text: | Story Points: | --- | |||||||
Clone Of: | Environment: | ||||||||
Last Closed: | 2009-01-20 19:58:34 UTC | Type: | --- | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Bug Depends On: | |||||||||
Bug Blocks: | 462434 | ||||||||
Attachments: |
|
Description
Greg Marsden
2008-03-31 23:12:29 UTC
Created attachment 299787 [details]
patch to unlock_page
This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux maintenance release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux Update release for currently deployed products. This request is not yet committed for inclusion in an Update release. Created attachment 311502 [details]
job file to reproduce the crash
To run:
mkdir /tmp/fio
while true; do fio dio-breaker; done
It runs for a few iterations before crashing for me.
in kernel-2.6.18-97.el5 You can download this test kernel from http://people.redhat.com/dzickus/el5 Oracle, a fix for this bug should be available for testing in the RHEL 5.3 Beta release. You can download these bits from RHN. Please take a moment to verify that the fix is present and functioning as expected and report back your test results as soon as possible. Thanks! Please ping your Red Hat Partner Manager with any additional questions. Removing the CVE name from the synopsis; this is because we have already fixed this issue for Red Hat Enterprise Linux 5 users via an asynchronous security advisory. This bug serves as a placeholder to ensure that the bug was also fixed and tested in the upcoming 5.3 kernel. An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2009-0225.html |