RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1284667 - Drop upstream-rejected patch iproute2-2.6.35-routing.patch
Summary: Drop upstream-rejected patch iproute2-2.6.35-routing.patch
Keywords:
Status: CLOSED DUPLICATE of bug 1290860
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: iproute
Version: 7.3
Hardware: All
OS: Linux
low
medium
Target Milestone: rc
: ---
Assignee: Phil Sutter
QA Contact: BaseOS QE Security Team
URL:
Whiteboard:
Depends On:
Blocks: 1301628
TreeView+ depends on / blocked
 
Reported: 2015-11-23 20:30 UTC by Phil Sutter
Modified: 2016-02-18 14:33 UTC (History)
7 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of: 622782
Environment:
Last Closed: 2016-02-18 14:33:20 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Phil Sutter 2015-11-23 20:30:53 UTC
+++ This bug was initially created as a clone of Bug #622782 +++

Description of problem:
iproute 2.6.35 loses routing to the other end of a PPP link.

After bringing up a PPP VPN link with 2.6.34-5, the routing table looks like:

Kernel IP routing table
Destination     Gateway         Genmask         Flags   MSS Window  irtt Iface
128.173.32.21   192.168.2.1     255.255.255.255 UGH       0 0          0 wlan0
128.173.32.21   0.0.0.0         255.255.255.255 UH        0 0          0 ppp0
192.168.2.0     0.0.0.0         255.255.255.0   U         0 0          0 wlan0
198.82.0.0      0.0.0.0         255.255.0.0     U         0 0          0 ppp0
128.173.0.0     0.0.0.0         255.255.0.0     U         0 0          0 ppp0
0.0.0.0         192.168.2.1     0.0.0.0         UG        0 0          0 wlan0

Everything goes out wlan0, except for the 2 /16's at work, which get routed across the ppp0 link instead.  Those packets get encapsulated and sent via wlan0 to the other end of the ppp0 link, and everything is good.

Upgrading to 2.6.35-1 I get this instead:

Kernel IP routing table
Destination     Gateway         Genmask         Flags   MSS Window  irtt Iface
128.173.32.21   0.0.0.0         255.255.255.255 UH        0 0          0 ppp0
192.168.2.0     0.0.0.0         255.255.255.0   U         0 0          0 wlan0
198.82.0.0      0.0.0.0         255.255.0.0     U         0 0          0 ppp0
128.173.0.0     0.0.0.0         255.255.0.0     U         0 0          0 ppp0
0.0.0.0         192.168.2.1     0.0.0.0         UG        0 0          0 wlan0

The route to 128.173.32.21 via wlan0 is gone. As a result, any attempt to send a packet out the ppp0 interface to the 2 destination /16s results in a routing loop - the encapsulated packets for the other end of the ppp0 loop get enqueued for the ppp0 link not wlan0.  And since it's an encapsulated packet, each time around it starts off with a new packet TTL so looping packets don't expire, they just get bigger (after a few seconds, watching with 'tcpdump' gets painful as each packet takes 50-60 lines to display). Backing off to  iproute-2.6.34-5 and changing nothing else makes it start working again.


Version-Release number of selected component (if applicable):
iproute-2.6.35-1.fc14.x86_64

--- Additional comment from Petr Šabata on 2010-08-17 08:36:32 EDT ---

Valdis,

I assume you're running 2.6.35 kernel.
Can you reproduce this issue with the following build?
http://koji.fedoraproject.org/koji/taskinfo?taskID=2406749

Also, I'd like to ask:

How do you configure your routing table?
Could you post the steps or attach the script you use?

Thank you.

--- Additional comment from Valdis Kletnieks on 2010-08-17 09:33:40 EDT ---

Confirming the 2.6.35-2 build works. Looks like iproute2-2.6.35-routing.patch was the fix for my issue.

The routing table entries were created thusly:

pppd call vt-ipv6
sleep 4
ip route add '128.173.0.0/16' dev 'ppp0'
ip route add '198.82.0.0/16' dev 'ppp0'

so the failing entry was created by pppd.

--- Additional comment from Phil Sutter on 2015-11-23 14:22:50 EST ---

The patch allegedly fixing the described issue has been rejected upstream. Policy forbids us to ship this change then. On the other hand, I really don't see how this change could influence the described behaviour at all. It touches code which is used exclusively for printing the routing table, and it affects IPv6 only.

Note that the patch has already been removed from Rawhide and Fedora23 prior to it's release. If you see the problem again with Fedora23, feel free to reopen this ticket and we'll find the real solution.

Comment 5 Phil Sutter 2016-02-18 14:33:20 UTC
This has already been fixed as a side-effect of bug 1290860.

*** This bug has been marked as a duplicate of bug 1290860 ***


Note You need to log in before you can comment on or make changes to this bug.