Bug 725986

Summary: [abrt] kernel: [240853.342571] WARNING: at net/ipv4/route.c:1677 ip_rt_bug+0x5c/0x62(): TAINTED ---------W
Product: [Fedora] Fedora Reporter: Nicolas Mailhot <nicolas.mailhot>
Component: kernelAssignee: Kernel Maintainer List <kernel-maint>
Status: CLOSED RAWHIDE QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: rawhideCC: aquini, gansalmon, itamar, jonathan, jwboyer, kernel-maint, madhu.chinakonda
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Unspecified   
Whiteboard: abrt_hash:58dda697ec7c2abc7e0eaec943c0abbe24875d58
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-08-15 14:44:18 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description Nicolas Mailhot 2011-07-27 08:51:19 UTC
abrt version: 2.0.5
cmdline:        ro root=/dev/VolGroup00/systeme SYSFONT=latarcyrheb-sun16 LANG=fr_FR.UTF-8 KEYTABLE=fr-latin9 rd_plytheme=spinfinity single
comment:        I don't know
kernel:         undefined
kernel_tainted: 512
kernel_tainted_long: Taint on warning.
reason:         [240853.342571] WARNING: at net/ipv4/route.c:1677 ip_rt_bug+0x5c/0x62()
time:           Mon Jul 25 15:00:00 2011

backtrace:
:[240853.342571] WARNING: at net/ipv4/route.c:1677 ip_rt_bug+0x5c/0x62()
:[240853.342574] Hardware name: EP45-DS5
:[240853.342576] Modules linked in: ppdev parport_pc lp parport it87 hwmon_vid coretemp ip6t_REJECT nf_conntrack_ipv6 ip6table_filter xt_socket nf_defrag_ipv6 ip6table_mangle ip6_tables nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack xt_mark iptable_mangle snd_emu10k1_synth snd_emux_synth snd_seq_virmidi snd_seq_midi_event snd_seq_midi_emul tuner_simple tuner_types wm8775 tda9887 tda8290 tuner joydev cx25840 microcode snd_emu10k1 ivtv serio_raw cx2341x v4l2_common videodev media v4l2_compat_ioctl32 tveeprom snd_hda_codec_hdmi i2c_i801 snd_rawmidi snd_ac97_codec pcspkr snd_hda_codec_realtek iTCO_wdt iTCO_vendor_support ac97_bus snd_util_mem snd_hda_intel snd_hda_codec snd_hwdep snd_seq snd_seq_device snd_pcm snd_timer r8169 mii snd soundcore snd_page_alloc uinput raid1 firewire_ohci pata_acpi firewire_core ata_generic crc_itu_t pata_jmicron radeon ttm drm_kms_helper drm i2c_algo_bit i2c_core [last unloaded: scsi_wait_scan]
:[240853.342669] Pid: 21156, comm: colord Tainted: G        W   3.0.0-1.fc16.x86_64 #1
:[240853.342671] Call Trace:
:[240853.342677]  [<ffffffff81058ebc>] warn_slowpath_common+0x83/0x9b
:[240853.342682]  [<ffffffff81058eee>] warn_slowpath_null+0x1a/0x1c
:[240853.342686]  [<ffffffff8141d3f2>] ip_rt_bug+0x5c/0x62
:[240853.342690]  [<ffffffff81425121>] dst_output+0x19/0x1d
:[240853.342695]  [<ffffffff81426936>] ip_local_out+0x20/0x25
:[240853.342699]  [<ffffffff8142787c>] ip_send_skb+0x19/0x58
:[240853.342703]  [<ffffffff81443fb0>] udp_send_skb+0x239/0x29b
:[240853.342708]  [<ffffffff81445683>] udp_sendmsg+0x5a1/0x7d4
:[240853.342713]  [<ffffffff813e5eba>] ? release_sock+0x35/0x155
:[240853.342717]  [<ffffffff8142521c>] ? ip_select_ident+0x3d/0x3d
:[240853.342723]  [<ffffffff8105ef9c>] ? local_bh_enable_ip+0xe/0x10
:[240853.342728]  [<ffffffff814de389>] ? _raw_spin_unlock_bh+0x31/0x35
:[240853.342732]  [<ffffffff813e5fd1>] ? release_sock+0x14c/0x155
:[240853.342736]  [<ffffffff8144cc45>] inet_sendmsg+0x66/0x6f
:[240853.342740]  [<ffffffff813e1292>] sock_sendmsg+0xe6/0x109
:[240853.342746]  [<ffffffff8108abfe>] ? lock_acquire+0xdb/0x103
:[240853.342751]  [<ffffffff8110934c>] ? might_fault+0x5c/0xac
:[240853.342755]  [<ffffffff8108aafa>] ? lock_release+0x173/0x19c
:[240853.342760]  [<ffffffff81109395>] ? might_fault+0xa5/0xac
:[240853.342764]  [<ffffffff813e1ec2>] ? copy_from_user+0x2f/0x31
:[240853.342768]  [<ffffffff813e3d84>] sys_sendto+0x132/0x174
:[240853.342773]  [<ffffffff81143ecd>] ? path_put+0x1f/0x23
:[240853.342777]  [<ffffffff810aff85>] ? audit_syscall_entry+0x11c/0x148
:[240853.342783]  [<ffffffff812452be>] ? trace_hardirqs_on_thunk+0x3a/0x3f
:[240853.342788]  [<ffffffff814e4fc2>] system_call_fastpath+0x16/0x1b

smolt_data:
:Traceback (most recent call last):
:  File "/usr/bin/smoltSendProfile", line 152, in <module>
:    profile = smolt.get_profile()
:  File "/usr/share/smolt/client/smolt.py", line 1415, in get_profile
:    return Hardware()
:  File "/usr/share/smolt/client/smolt.py", line 1004, in Hardware
:    _hardware_instance = _Hardware()
:  File "/usr/share/smolt/client/smolt.py", line 591, in __init__
:    self.host = Host()
:  File "/usr/share/smolt/client/smolt.py", line 283, in __init__
:    self.systemMemory = Gate().process('ram_size', memory['ram'], 0)
:TypeError: 'NoneType' object is not subscriptable

Comment 1 Josh Boyer 2011-08-15 14:44:18 UTC
This should be fixed by this build:

http://koji.fedoraproject.org/koji/buildinfo?buildID=258691

which contains this commit:

commit d547f727df86059104af2234804fdd538e112015
Author: Julian Anastasov <ja>
Date:   Sun Aug 7 22:20:20 2011 -0700

    ipv4: fix the reusing of routing cache entries
    
        compare_keys and ip_route_input_common rely on
    rt_oif for distinguishing of input and output routes
    with same keys values. But sometimes the input route has
    also same hash chain (keyed by iif != 0) with the output
    routes (keyed by orig_oif=0). Problem visible if running
    with small number of rhash_entries.
    
        Fix them to use rt_route_iif instead. By this way
    input route can not be returned to users that request
    output route.
    
        The patch fixes the ip_rt_bug errors that were
    reported in ip_local_out context, mostly for 255.255.255.255
    destinations.
    
    Signed-off-by: Julian Anastasov <ja>
    Signed-off-by: David S. Miller <davem>


Please reopen if you see it again.