Bug 566104
| Summary: | route: BUG at include/linux/timer.h:82 (call from rt_secret_rebuild_oneshot) | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 5 | Reporter: | Vitaliy Gusev <vgusev> | ||||
| Component: | kernel | Assignee: | Jiri Olsa <jolsa> | ||||
| Status: | CLOSED ERRATA | QA Contact: | Network QE <network-qe> | ||||
| Severity: | urgent | Docs Contact: | |||||
| Priority: | low | ||||||
| Version: | 5.4 | CC: | davem, dtian, herbert.xu, jarod, khorenko, kolyshkin, kzhang, nhorman, qcai, tgraf, xemul | ||||
| Target Milestone: | rc | ||||||
| Target Release: | --- | ||||||
| Hardware: | All | ||||||
| OS: | Linux | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2011-01-13 21:07:06 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Attachments: |
|
||||||
|
Description
Vitaliy Gusev
2010-02-17 09:20:15 UTC
Created attachment 394697 [details]
fix-route-add_timer.patch
PATCH: Fix caught BUG_ON during rt_secret_rebuild()
Problem is found by vzbugs hi, I dont see this change in the upstream and it looks like it should be there. Any plan to post it upstream? thanks, jirka (In reply to comment #3) > hi, > > I dont see this change in the upstream and it looks like it should be there. > Any plan to post it upstream? > > thanks, > jirka I will sent to upstream in two days. could you plz post link to the sent patch once it's out thanks, jirka (In reply to comment #5) > could you plz post link to the sent patch once it's out "route: Fix caught BUG_ON during rt_secret_rebuild_oneshot()" http://patchwork.ozlabs.org/patch/47840/ thanks, any idea how to reproduce this? jirka Yes. You should do in parallels two things: 1. change the /proc/sys/net/ipv4/route/secret_interval value 2. force the rt cache grow e.g. by routing many packets with different IPs through the node This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux maintenance release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux Update release for currently deployed products. This request is not yet committed for inclusion in an Update release. in kernel-2.6.18-200.el5 You can download this test kernel from http://people.redhat.com/jwilson/el5 Detailed testing feedback is always welcomed. I was trying to reproduce the issue these days with kernel 2.6.18-194.el5, but I couldn't trigger it, I did following things: 1. changed the /proc/sys/net/ipv4/route/secret_interval value to 86400. 2. changed the route cache hash entries to smaller value: [root@intel-s3e8132-01 ~]# dmesg | grep "IP route" IP route cache hash table entries: 16 (order: -5, 128 bytes) [root@intel-s3e8132-01 ~]# cat /proc/sys/net/ipv4/route/max_size 256 3. routed many packets with different destination IPs and the route cache grew. [root@intel-s3e8132-01 ~]# ip -o route ls cache|wc -l 127 But seems the route cache prunes itself when it reaches the limit? I couldn't get the message "Route hash chain too long!". Any ideas will be much appreciated. You will not be able to easily reproduce the issue, as this is a rare race. If you cannot accept the patch by *only* reviewing it - you can close the bug. (In reply to comment #17) > If you cannot accept the patch by *only* reviewing it - you can close the bug. AFAIU the patch was actually accepted (as per comment #14). Well, not yet appeared in the released kernel, but it will be there. I am not sure what the RH policy is wrt closing the bugs. Dayong question is not about whether to accept the patch, he just tried to verify the bug. An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2011-0017.html |