Bug 133381
Summary: | cat /proc/net/ip_conntrack produce kernel panic | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 3 | Reporter: | Levente Farkas <lfarkas> |
Component: | kernel | Assignee: | Thomas Graf <tgraf> |
Status: | CLOSED WONTFIX | QA Contact: | Brian Brock <bbrock> |
Severity: | high | Docs Contact: | |
Priority: | medium | ||
Version: | 3.0 | CC: | craig, davem, petrides, riel, rkhan, simon.matter |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | i686 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2007-10-19 19:17:46 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Levente Farkas
2004-09-23 16:54:45 UTC
Without a OOPS trace there is no way I can possibly debug this problem. I'm seeing kernel panics myself. If I run a script in cron that greps /proc/net/ip_conntrack every few minutes, I get panics about once a week. There's a bug entry at osdl.org: http://bugme.osdl.org/show_bug.cgi?id=1764 And a mailing list posting to netfilter-devel: http://lists.netfilter.org/pipermail/netfilter-devel/2004-April/015054.html As far as I know these only apply to the 2.4.26 source, and the function destroy_conntrack is different enough in my kernel (RH9 2.4.20-8) I don't know how to apply the patch. See also this netfilter bug entry: https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=131 I have just seen this panic on a RHEL3 U5 box, kernel-2.4.21-32.0.1.EL. I have seen this back in the RH 7.x days but it's unfortunately it still happens with the latest RHEL3 kernel. We're still waiting for the oops output. we no longer use rhel 3 we update all of our server to rhel 4 and no longer get the kernel panic. but just look at the above osdl bugzilla entry. This bug is filed against RHEL 3, which is in maintenance phase. During the maintenance phase, only security errata and select mission critical bug fixes will be released for enterprise products. Since this bug does not meet that criteria, it is now being closed. For more information of the RHEL errata support policy, please visit: http://www.redhat.com/security/updates/errata/ If you feel this bug is indeed mission critical, please contact your support representative. You may be asked to provide detailed information on how this bug is affecting you. |