Bug 630129
Summary: | [RHEL5 IA64 XEN] netfront driver: alloc_dev: Private data too big. | ||||||||
---|---|---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 5 | Reporter: | Jarod Wilson <jarod> | ||||||
Component: | kernel | Assignee: | Neil Horman <nhorman> | ||||||
Status: | CLOSED ERRATA | QA Contact: | Boris Ranto <branto> | ||||||
Severity: | medium | Docs Contact: | |||||||
Priority: | urgent | ||||||||
Version: | 5.6 | CC: | branto, dhoward, drjones, jburke, jmarchan, jpirko, jwest | ||||||
Target Milestone: | rc | Keywords: | ZStream | ||||||
Target Release: | --- | ||||||||
Hardware: | ia64 | ||||||||
OS: | Linux | ||||||||
Whiteboard: | |||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||
Doc Text: |
Recently applied patch introduced a bug, which caused the Xen guest networking not to work properly on 64-bit Itanium processors. However, this bug also revealed an issue, which may have led to a data corruption. With this update, both errors have been fixed, and Xen virtual guest networking now works as expected.
|
Story Points: | --- | ||||||
Clone Of: | |||||||||
: | 630163 (view as bug list) | Environment: | |||||||
Last Closed: | 2011-01-13 21:15:40 UTC | Type: | --- | ||||||
Regression: | --- | Mount Type: | --- | ||||||
Documentation: | --- | CRM: | |||||||
Verified Versions: | Category: | --- | |||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||
Embargoed: | |||||||||
Bug Depends On: | |||||||||
Bug Blocks: | 630163, 637219, 637220 | ||||||||
Attachments: |
|
Description
Jarod Wilson
2010-09-03 18:44:18 UTC
Adding Drew to the cc list so he's aware of this one too. Since its a data corruptor, its likely we're going to want it for z-stream as well, so also adding z-stream folks to cc list. Created attachment 442975 [details]
utested patch
Still need to test it, but heres my first pass at a patch to fix this. Basically just allocate a wrapper struct as the netdev_private data, which contains a pointer to the separately allocated netfront_info struct that is more than 65kb long. Should do the trick. Will test it out ASAP.
This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux maintenance release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux Update release for currently deployed products. This request is not yet committed for inclusion in an Update release. (In reply to comment #3) > Created attachment 442975 [details] > utested patch > > Still need to test it, but heres my first pass at a patch to fix this. > Basically just allocate a wrapper struct as the netdev_private data, which > contains a pointer to the separately allocated netfront_info struct that is > more than 65kb long. Should do the trick. Will test it out ASAP. Your patch should set err = -ENOMEM. The ERR_PTR() cast is already made when we return from the function. Actually, since the only error it can return is -ENOMEM, we can get rid of err variable and ERR_PTR(-ENOMEM) all the time. Created attachment 446082 [details] tested patch heres a version of the patch that I've tested and validated, and a brew build of it. I'll post it shortly http://brewweb.devel.redhat.com/brew/taskinfo?taskID=2750022 in kernel-2.6.18-219.el5 You can download this test kernel from http://people.redhat.com/jwilson/el5 Detailed testing feedback is always welcomed. Technical note added. If any revisions are required, please edit the "Technical Notes" field accordingly. All revisions will be proofread by the Engineering Content Services team. New Contents: Recently applied patch introduced a bug, which caused the Xen guest networking not to work properly on 64-bit Itanium processors. However, this bug also revealed an issue, which may have led to a data corruption. With this update, both errors have been fixed, and Xen virtual guest networking now works as expected. An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2011-0017.html |