Hi,

This patch fixes a subtle corruption when doing raw IO on the 2.2.x
kernel
with bigmem enabled. The problem was first reported by Markus Döhr while

running SAP DB on a variation of the 2.2.16 kernel with among others the

following patches installed,

> linux-2.2.16-rawio.patch
> linux-2.2.16-raw-fixup.patch
> linux-2.2.16-raw-fixup2.patch
> linux-2.2.16-bigmem.patch
> linux-2.2.16-bigmem-raw.patch
> linux-2.2.16-bigmem-dcache.patch
> linux-2.2.16-bigmem-initrd.patch

See http://marc.theaimsgroup.com/?l=linux-kernel&m=97038067229365&w=2
for the original description.

The corruption is caused by a bug in kiobuf_copy_bounce in fs/iobuf.c -
the
bigmem page containing the user data is not always copied to its
associated
bounce buffer. This would occur when an array of pages (>1) are passed
to
kiobuf_copy_bounce and a normal page happens to appear before a bigmem
page in the array, which in turn leads to the writing of uninitialized
(garbage)
pages to the raw device.

The corruption happens rather infrequently. It has been reproduced both
with
the SAP DB and without. It appears that intense paging activity
increases its
chance of occurrence.

Regards,

Peng Dai
Kernel Engineering                                          Tel:
978-446-9166 ext. 276
Mission Critical Linux Inc.                              Fax:
978-446-9470
100 Foot of John                                               Email:
[EMAIL PROTECTED]
Lowell, MA 01852

--- linux/fs/iobuf.c.orig       Tue Nov 28 13:54:26 2000
+++ linux/fs/iobuf.c    Tue Nov 28 13:55:17 2000
@@ -213,10 +213,10 @@
                unsigned long kin, kout;
                int pagelen = length;
                
-               if (bounce_page) {
-                       if ((pagelen+offset) > PAGE_SIZE)
-                               pagelen = PAGE_SIZE - offset;
-               
+               if ((pagelen+offset) > PAGE_SIZE)
+                       pagelen = PAGE_SIZE - offset;
+
+               if (bounce_page) {              
                        if (direction == COPY_TO_BOUNCE) {
                                kin  = kmap(page, KM_READ);
                                kout = kmap(bounce_page, KM_WRITE);

Reply via email to