Bug 872612
| Summary: | net: WARN if struct ip_options was allocated directly by kmalloc [rhel-5.9] | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 5 | Reporter: | Jiri Pirko <jpirko> | |
| Component: | kernel | Assignee: | Jiri Pirko <jpirko> | |
| Status: | CLOSED ERRATA | QA Contact: | Hangbin Liu <haliu> | |
| Severity: | high | Docs Contact: | ||
| Priority: | urgent | |||
| Version: | 5.9 | CC: | agordeev, ccui, cww, dhoward, haliu, jpirko, kzhang, rkhan, tlavigne | |
| Target Milestone: | rc | Keywords: | ZStream | |
| Target Release: | --- | |||
| Hardware: | Unspecified | |||
| OS: | Unspecified | |||
| Whiteboard: | ||||
| Fixed In Version: | kernel-2.6.18-346.el5 | Doc Type: | Enhancement | |
| Doc Text: |
The INET socket interface has been modified to send a warning message when the ip_options structure is allocated directly by a third-party module using the kmalloc() function.
|
Story Points: | --- | |
| Clone Of: | ||||
| : | 872799 (view as bug list) | Environment: | ||
| Last Closed: | 2013-01-08 04:44:34 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | 855302 | |||
| Bug Blocks: | 874973 | |||
|
Description
Jiri Pirko
2012-11-02 15:02:40 UTC
This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux release for currently deployed products. This request is not yet committed for inclusion in a release. Patch(es) available in kernel-2.6.18-346.el5 You can download this test kernel (or newer) from http://people.redhat.com/plougher/el5/ Detailed testing feedback is always welcomed. If you require guidance regarding testing, please ask the bug assignee. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHBA-2013-0006.html |