for the s2io module, a large enough rx_ring_rz will attempt to claim all memory on the system. A stupid admin <cough, cough> might naively assume rx_ring_sz could take as input the output of ethtool -g's rx ring max. The tx_fifo_sz parameter works exactly this way. The documentation points out that: d. rx_ring_sz Size of each receive ring(in 4K blocks) Valid range: Limited by memory on system but this could be a a bit more ... expected. In the vary least, maybe check if the requested rx_ring_sz exceeds current physical memory. eg: ahecox@intel-bensley ~ $ sudo ethtool -g eth1 Ring parameters for eth1: Pre-set maximums: RX: 152400 RX Mini: 0 RX Jumbo: 152400 TX: 8192 Current hardware settings: RX: 3840 RX Mini: 0 RX Jumbo: 3840 TX: 8192 ahecox@intel-bensley ~ $ sudo rmmod s2io ahecox@intel-bensley ~ $ modinfo s2io | grep rx parm: rx_ring_num:uint parm: rx_ring_mode:uint parm: rxsync_frequency:uint parm: rx_ring_sz:array of uint ahecox@intel-bensley ~ $ sudo modprobe s2io rx_ring_num=1 rx_ring_sz=152400 Message from syslogd@ at Mon Mar 23 22:48:32 2009 ... intel-bensley kernel: Unable to handle kernel paging request at 000000011fbdd290 RIP: Message from syslogd@ at Mon Mar 23 22:48:32 2009 ... intel-bensley kernel: [<ffffffff80021bee>] dma_alloc_coherent+0x2d/0x1ca
Andrew, if you think this is really a bug, please raise these flags: rhel‑5.5.0 ? pm_ack ? devel_ack ? qa_ack + Thanks.
set (I can't set qa_ack+)
There is a hard limit (due to array size) of the rx_ring_sz to 150 entries. Currently, the driver will let any value be set, which can cause the memory corruption bug you are seeing. I should have a fix pushed to mainline shortly.
This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux maintenance release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux Update release for currently deployed products. This request is not yet committed for inclusion in an Update release.
Where are the patches upstream for this to inspect?
(In reply to comment #7) > Where are the patches upstream for this to inspect? http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=1853e2e15dc95ff3430530941b5856581251ef70
Patch(es) available in kernel-2.6.18-250.el5 Detailed testing feedback is always welcomed.
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2011-1065.html