Description of problem: The last-submitted LPFC driver version 8.2.0.63.3p for RHEL5.5 inclusion, uses the following symbols that will need to be added to the RHEL5.5 kabi_whitelist: pci_request_selected_regions pci_release_selected_regions pci_disable_pcie_error_reporting pci_cleanup_aer_uncorrect_error_status pci_select_bars fc_vport_create pci_enable_pcie_error_reporting This is the output of the abi_check.py script: # ~/abi_check.py lpfc.ko Red Hat Enterprise Linux 5 ABI Checker -------------------------------------- ABI Checker version: 1.2 Module: lpfc.ko Kernel: 2.6.18-186.el5 Whitelist: /usr/src/kernels/2.6.18-186.el5-x86_64/kabi_whitelist WARNING: The following symbols are used by your module WARNING: and are not on the ABI whitelist. symbol: pci_request_selected_regions symbol: pci_release_selected_regions symbol: pci_disable_pcie_error_reporting symbol: pci_cleanup_aer_uncorrect_error_status symbol: pci_select_bars symbol: fc_vport_create symbol: pci_enable_pcie_error_reporting #
We are at the end of RHEL 5.5. Unfortunately this isn't going to make it. Deferring to 5.6.
The following symbols are used by LPFC driver version 8.2.0.74.1p for RHEL5.6 inbox inclusion. These symbols will need to be added to the RHEL5.6 kernel api whitelist. (This check was done against the RHEL5.5 GA kernel) pci_request_selected_regions pci_release_selected_regions pci_disable_pcie_error_reporting pci_cleanup_aer_uncorrect_error_status pci_select_bars fc_vport_create pci_enable_pcie_error_reporting
Please can you let me know whether you are making this request solely because you intend to have this driver included *within* the RHEL5.6 kernel? If this is the case, this is not a bug, because we do not need all symbols for all internal drivers to be on the whitelist. The drivers internally are self-consistent. Please update this bug, or close it accordingly. Thanks.
Created attachment 443424 [details] rhel56-kabi-whitelist-add-pci-symbols.patch
Created attachment 443431 [details] rhel56-kabi-whitelist-add-scsi-symbols.patch
Thank you for filing your request to update our kernel ABI whitelists. We are now reviewing your request and will endeavor to provide an update in due course.
in kernel-2.6.18-223.el5 You can download this test kernel (or newer) from http://people.redhat.com/jwilson/el5 Detailed testing feedback is always welcomed.
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2011-0017.html