RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1861527 - Excessive memory and CPU usage on a router with IPv6 BGP feed.
Summary: Excessive memory and CPU usage on a router with IPv6 BGP feed.
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: NetworkManager
Version: 8.2
Hardware: Unspecified
OS: Unspecified
high
medium
Target Milestone: rc
: 8.6
Assignee: Beniamino Galvani
QA Contact: David Jaša
URL:
Whiteboard:
Depends On:
Blocks: 2063175
TreeView+ depends on / blocked
 
Reported: 2020-07-28 20:56 UTC by Tomasz Kepczynski
Modified: 2022-05-10 15:30 UTC (History)
13 users (show)

Fixed In Version:
Doc Type: No Doc Update
Doc Text:
Clone Of:
: 2063175 (view as bug list)
Environment:
Last Closed: 2022-05-10 14:54:06 UTC
Type: Bug
Target Upstream Version:
Embargoed:
pm-rhel: mirror+


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHEA-2022:1985 0 None None None 2022-05-10 14:54:38 UTC
freedesktop.org Gitlab NetworkManager NetworkManager-ci merge_requests 900 0 None opened test that NM ignores routes that are not static, DHCP or RA 2021-12-23 18:21:13 UTC
freedesktop.org Gitlab NetworkManager NetworkManager merge_requests 1038 0 None opened platform: add bpf filter to ignore routes from routing daemons 2021-12-01 09:15:29 UTC

Internal Links: 1896551

Description Tomasz Kepczynski 2020-07-28 20:56:10 UTC
Description of problem:
NetworkManager excessive memory and CPU usage. Additionally nmcli is not responsive.

Version-Release number of selected component (if applicable):
NetworkManager-1.22.8-4.el8.x86_64

How reproducible:
Always

Steps to Reproduce:
I have a system which works as a router taking two BGP feeds (IPv6 only) over two separate tunnels.

That' how it looks like:
boholt:~> date; nmcli conn show; date
Tue Jul 28 22:39:53 CEST 2020
NAME                  UUID                                  TYPE       DEVICE    
airnet                b282e19c-6c99-4790-adff-125f745bb4b8  pppoe      enp4s0    
dummy0                97fbca18-bdd9-4fa5-b55f-6c63942c527d  dummy      dummy0    
enp1s0                9224e07c-e3cf-402a-b685-c7bf7a7cc0b7  ethernet   enp1s0    
enp1s0.2              30c3132f-3747-4be6-85ee-9386ae736b1a  vlan       enp1s0.2  
enp1s0.20             55c635b9-281e-4163-83d6-8a1808c324cc  vlan       enp1s0.20 
enp1s0.3              63cbaba1-5b48-41a4-9b43-dcf4b0b0d3cb  vlan       enp1s0.3  
enp2s0.10             0e8d36c9-d483-4b85-8efc-cb90bcf35e8d  vlan       enp2s0.10 
enp2s0.11             74170dbb-4035-444e-b7b8-5b08e483ad73  vlan       enp2s0.11 
enp1s0.30             ee4d6110-0909-4bb1-8869-779350c2d2e2  vlan       enp1s0.30 
enp2s0.40             559e7484-7090-492d-987d-168d17e1909e  vlan       enp2s0.40 
enp2s0.41             09f23933-badc-4ca6-ac0e-811f4e406c35  vlan       enp2s0.41 
freetransit.ch        b9e7c132-88b6-4044-939f-28eb78be69bc  ip-tunnel  tun1      
tunnelbroker.ch - DE  64381a44-7794-419b-b6c6-7b821517c474  ip-tunnel  tun2      
enp2s0                3ba60ac7-5a9e-4116-a367-80b3a03c2c35  ethernet   enp2s0    
Tue Jul 28 22:40:30 CEST 2020

Please note simple connection listing took nearly 40 seconds.

boholt:~> ps -C NetworkManager u
USER         PID %CPU %MEM    VSZ   RSS TTY      STAT START   TIME COMMAND
root         913 26.0  6.8 914908 537920 ?       Rsl  Jul27 359:12 /usr/sbin/NetworkManager --no-daemon

CPU is capped by systemd override to 25% (CPUQuota=25%) so it is clearly visible it takes all it gets. Resident segment size is close to 0.5GB which seems a bit excessive for a tool which is supposed to only manage network connections.

I've seen NetworkManager utilizing CPU to 100% before I've put a cap on it.

Actual results:
See above. The tool using too much memory, too much CPU and too much power (and grilling my CPU unnecessarily).

Expected results:
For comparison, see below from different system, just static network configuration:

vesemir:~> ps -C NetworkManager u
USER       PID %CPU %MEM    VSZ   RSS TTY      STAT START   TIME COMMAND
root      1545  0.0  0.0 488932  9072 ?        Ssl  21:55   0:00 /usr/sbin/NetworkManager --no-daemon

That looks more reasonable.

Additional info:
As far as I can tell NetworkManager greedly tries to get ALL of the routes from the two tunnels above. I can't even look at it now as all I get is:
boholt:~> nmcli conn show b9e7c132-88b6-4044-939f-28eb78be69bc
Error: b9e7c132-88b6-4044-939f-28eb78be69bc - no such connection profile.

but I've seen it previously.

For your reference:
boholt:~> ip -6 route | wc -l
90769
So there are that many IPv6 routes in kernel routing table.

Disabling appropriate protocols in bird seems to return NetworkManager to normal.

I've tried to move tunnel interfaces to network-scripts and leave NetworkManager running for the local interfaces but it didn't help as far as I can tell.

I can also see NetworkManager flooding my log with the following message every 30 seconds or so:
Jul 28 22:49:35 boholt NetworkManager[913]: <info>  [1595969375.4473] platform-linux: netlink: read: too many netlink events. Need to resynchronize platform cache

For me - it CLEARLY disqualifies NetworkManager as ONLY solution to manage interfaces on a system. Is there any alternative beyond deprecated network-scripts which cannot handle some of the tunnel types (gretap) I need?

Comment 1 Thomas Haller 2020-07-28 21:17:30 UTC
This is a known problem (and of course needs fixing).


> For me - it CLEARLY disqualifies NetworkManager as ONLY solution to manage interfaces on a system. Is there any alternative beyond deprecated network-scripts which cannot handle some of the tunnel types (gretap) I need?

Right. There are certain use-cases where NetworkManager is badly suited today. The solution for that will be to fix NetworkManager for those use-cases.

The workaround until then is indeed network-scripts (or a script of your choice to configure your interfaces).

Sorry if that is disappointing and thank you for the elaborate report.

Comment 2 Tomasz Kepczynski 2020-07-28 21:22:18 UTC
It's a pity these limitations are not documented. I've put some effort to transition to NetworkManager only to learn I would have better spent that time elsewhere.

Would it be possible to document what setups are better avoided with NetworkManager (like in known issues section of RHEL release notes)?

Comment 3 Thomas Haller 2020-07-28 21:39:19 UTC
Yes, that should be better documented.

Release notes don't seem the right place, as those usually talk about changes. Nothing changed here.

What is your BGP setup? Are you using quagga? Maybe this should be documented alongside the BGP documentation. Did you consult a particular documentation where you would have expect to be notified about this problem?


In practice, the most relevant use-case where NetworkManager is unsuited is if you have a large number of IP routes, IP addresses, or other netlink objects. What exactly "large" means is unclear, but at some at some point performance/overhead becomes a problem. Of course, that is a problem on a BGP router. BGP is probably the most prominent case with this problem.

Comment 4 Tomasz Kepczynski 2020-07-28 22:08:43 UTC
Well, I basically didn't know until I've hit it. A few searches on google didn't reveal anything above cryptic "unsuitable for some use cases" at first and I think I've only only hit one result which specifically mentioned BGP router (and I wasn't even sure how relevant it still is) only after I realized it may be BGP which triggers the issue and added it to the search.

I am using bird but I guess quagga/frr would trigger similar issues.

I think I only noticed it when I added SECOND tunnel. The first one was giving limited number of routes (below 30000) and I don't recall noticing any troubles. When I added the second tunnel and the total number of routes jumped to just over 90000 it clearly became a problem.

Comment 7 Beniamino Galvani 2021-11-02 13:13:49 UTC
> boholt:~> ip -6 route | wc -l
> 90769

How do those routes look like? Do they have a special "protocol" value that can be used to distinguish them from regular routes?

If so, we can probably add a bpf filter to the netlink socket so that they are not passed back to user space.

Comment 9 Tomasz Kepczynski 2021-11-02 17:50:30 UTC
I would be cautious with EXCLUDING routes this way. Bird uses 'proto bird' which is visible in the listing:

boholt:~> ip -6 route show root fd00::/7
fd00:114:514::/48 proto bird src fddd:fdef:2ea1::1 metric 32 pref medium
        nexthop via fe80::1588 dev dn42_chrismoos weight 1 
        nexthop via fe80::ade0 dev dn42_kioubit weight 1 
fd00:191e:1470::/48 proto bird src fddd:fdef:2ea1::1 metric 32 pref medium
        nexthop via fe80::1588 dev dn42_chrismoos weight 1 
        nexthop via fe80::ade0 dev dn42_kioubit weight 1 
fd00:1926:817::/48 via fe80::ade0 dev dn42_kioubit proto bird src fddd:fdef:2ea1::1 metric 32 pref medium
fd00:1953:615::/48 proto bird src fddd:fdef:2ea1::1 metric 32 pref medium
        nexthop via fe80::1588 dev dn42_chrismoos weight 1 
        nexthop via fe80::ade0 dev dn42_kioubit weight 1 
[--cut--]

but you'll have to include and maintain at least a few more exclusions judging from /etc/iproute2/rt_protos file (I can see at least zebra and gated causing similar problem). Allowing only the protocols Network Manager needs (does it?) to see would be a better solution in my opinion.

I am also not sure how ECMP routes are presented to the application and if they carry the protocol indication (which is not visible next to them).

Currently I am on network-scripts and systemd-networkd mix but it also comes with its own challenges (where is pppoe support for systemd-networkd?). Anyway - it performs much better than NetworkManager.

Comment 14 Beniamino Galvani 2021-11-24 10:17:08 UTC
(In reply to Tomasz Kepczynski from comment #9)

> but you'll have to include and maintain at least a few more exclusions
> judging from /etc/iproute2/rt_protos file (I can see at least zebra and
> gated causing similar problem). Allowing only the protocols Network Manager
> needs (does it?) to see would be a better solution in my opinion.

Routing protocol values are defined in /usr/include/linux/rtnetlink.h:

/* rtm_protocol */

#define RTPROT_UNSPEC           0
#define RTPROT_REDIRECT         1       /* Route installed by ICMP redirects;
                                           not used by current IPv4 */
#define RTPROT_KERNEL           2       /* Route installed by kernel            */
#define RTPROT_BOOT             3       /* Route installed during boot          */
#define RTPROT_STATIC           4       /* Route installed by administrator     */

/* Values of protocol >= RTPROT_STATIC are not interpreted by kernel;
   they are just passed from user and back as is.
   It will be used by hypothetical multiple routing daemons.
   Note that protocol values should be standardized in order to
   avoid conflicts.
 */

#define RTPROT_GATED            8       /* Apparently, GateD */
#define RTPROT_RA               9       /* RDISC/ND router advertisements */
#define RTPROT_MRT              10      /* Merit MRT */
#define RTPROT_ZEBRA            11      /* Zebra */
#define RTPROT_BIRD             12      /* BIRD */
#define RTPROT_DNROUTED         13      /* DECnet routing daemon */
#define RTPROT_XORP             14      /* XORP */
#define RTPROT_NTK              15      /* Netsukuku */
#define RTPROT_DHCP             16      /* DHCP client */
#define RTPROT_MROUTED          17      /* Multicast daemon */
#define RTPROT_KEEPALIVED       18      /* Keepalived daemon */
#define RTPROT_BABEL            42      /* Babel daemon */
#define RTPROT_OPENR            99      /* Open Routing (Open/R) Routes */
#define RTPROT_BGP              186     /* BGP Routes */
#define RTPROT_ISIS             187     /* ISIS Routes */
#define RTPROT_OSPF             188     /* OSPF Routes */
#define RTPROT_RIP              189     /* RIP Routes */
#define RTPROT_EIGRP            192     /* EIGRP Routes */

--

Of those, NM currently uses values <= 4, RTPROT_RA (9) and RTPROT_DHCP
(16). I think it should ignore all the other protocol values.


> I am also not sure how ECMP routes are presented to the application and if
> they carry the protocol indication (which is not visible next to them).

From what I see, as long as the next hops are added with the right
protocol, as in:

 ip route append dev enp1s0 default via fe80::1240 proto bird

or the route itself has the protocol specified:

 ip route add default proto bird \
    nexthop via fe80::1 dev enp1s0 \
    nexthop via fe80::2 dev enp1s0 \
    nexthop via fe80::3 dev enp1s0

then NM will ignore them, as each next-hop is presented over netlink
as an individual route with its own protocol.

Comment 15 Tomasz Kepczynski 2021-11-24 10:36:20 UTC
At least zebra and bird can also install routes learned by neighbor discovery protocol. I think they are installed with their respective protocol ids, not RTPROT_RA. I'm not sure what side effect (beyond not showing them in 'nmcli conn show' output) dropping those from reaching NetworkManager can have.

Comment 16 Beniamino Galvani 2021-11-25 10:14:07 UTC
(In reply to Tomasz Kepczynski from comment #15)
> At least zebra and bird can also install routes learned by neighbor
> discovery protocol. I think they are installed with their respective
> protocol ids, not RTPROT_RA. I'm not sure what side effect (beyond not
> showing them in 'nmcli conn show' output) dropping those from reaching
> NetworkManager can have.

NM doesn't do anything with routes installed by other tools, so this
shouldn't be a problem.

I prepared a patch to add a BPF filter that drops all undesired routes
from the netlink socket:

https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/commit/b8507db5f48a23d555041f6d2a5763cc55d6eebd

I tested it by adding 2 million routes ("ip route add dev eth0
$addr/32 proto bird") and it seems to work well.

Do you know how I can reproduce your BGP scenario more accurately? In
the bug description you talk about a IPv6 BGP feed; is that something
that can be configured easily on any machine? (sorry, I'm not familiar
with BGP).

Comment 17 Tomasz Kepczynski 2021-11-25 15:15:52 UTC
I can share my bird config but you need a peer and own ASN (autonomous system number). I am taking three live BGP feeds over three tunnels, this requires some effort. And I think the important part is not necessarily the number of routes but the number of route updates which trigger NetworkManager activity.

I am pretty sure Redhat and/or IBM do take full BGP feed from the Internet and can expose that feed to you. The question is how willing is your IT department to do that.

If you can build the package against RHEL 8.5 and put it somewhere (maybe on https://copr.fedorainfracloud.org/?) I can try to test it.

Comment 18 Beniamino Galvani 2021-11-26 13:47:00 UTC
I did a scratch build for RHEL 8.5 with the patch and put the RPMs here:

http://people.redhat.com/~bgalvani/NM/rh1861527/

You can download them and do a "rpm -Fvh *rpm" to upgrade.

Comment 20 David Jaša 2021-12-23 18:21:14 UTC
I managed once to hit a similar condition but at that time, it was kernel what took all the memory (at 1.25 GB VM) during batch addition of the routes. Since I didn't manage to repeat it, let's put this bug to Verified:Tested.

Comment 23 Tomasz Kepczynski 2021-12-24 14:03:27 UTC
I've enabled NetworkManager overnight on one of affected systems and it got killed by OOM killer a few times in less then 24 hours. These were the following packages from Alma 8.5:

- NetworkManager-libnm-1.32.10-4.el8.x86_64
- NetworkManager-1.32.10-4.el8.x86_64

I am upgrading them to:

- NetworkManager-1.32.10-4.1.rh1861527.el8_5.x86_64
- NetworkManager-libnm-1.32.10-4.1.rh1861527.el8_5.x86_64

and will let them run for a couple of days and see what happens. If they survive - I'll try to migrate network-scripts and systemd-networkd configuration to them and see how it works.

Comment 24 Tomasz Kepczynski 2021-12-27 09:14:45 UTC
I have it running for over 24 hours and it behaves reasonably well.

I have nearly 140000 IPv6 routes from one Internet BGP feed and a few hundred of BGP routes from DN42 experimental network from a couple of peers. NetworkManager keeps its apetite for memory under control:

coen:~> ps -C NetworkManager u
USER         PID %CPU %MEM    VSZ   RSS TTY      STAT START   TIME COMMAND
root         743  0.0  1.1 382460 11516 ?        Ssl  gru25   0:16 /usr/sbin/Net

This is the same system where distro provided NetworkManager was killed a couple of times in less than 24 hrs.

Comment 26 Thomas Haller 2022-01-24 13:31:05 UTC
originally, the proposed solution was a BPF filter. But that had problems and got reverted ([1]).
the solution is now to do the same filtering entirely in user-space ([2])

According to  my tests, the performance seems still good also when doing it in user-space.

@Tomasz, it would be very interesting, if you could retest. Sorry about the effort.
Would you wish for a rhel-8.5 scratch build? There are also the copr builds at https://copr.fedorainfracloud.org/coprs/networkmanager/NetworkManager-main/builds/ .


[1] https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/commit/c37a21ea2906aaafec82b76f4ae5d1aae81ac057
[2] https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/commit/3416b00988cbaa53ce6edd81762ff3cdd7b1a1a5

Comment 27 Tomasz Kepczynski 2022-01-24 14:35:52 UTC
I've updated to:

coen:~# rpm -qa NetworkManager\*
NetworkManager-libnm-1.35.5-29598.copr.26c43e4bcc.el8.x86_64
NetworkManager-1.35.5-29598.copr.26c43e4bcc.el8.x86_64

and will let it run for some time.

26 minutes after boot it looks reasonable:

coen:~# ps -C NetworkManager u
USER         PID %CPU %MEM    VSZ   RSS TTY      STAT START   TIME COMMAND
root         722  0.4  1.6 381836 16368 ?        Ssl  15:08   0:07 /usr/sbin/NetworkManager --no-daemon
coen:~# uptime
 15:34:51 up 26 min,  1 user,  load average: 1,52, 1,15, 0,78

Comment 28 Thomas Haller 2022-01-24 19:06:31 UTC
(In reply to Tomasz Kepczynski from comment #27)
> I've updated to:
> 
> coen:~# rpm -qa NetworkManager\*
> NetworkManager-libnm-1.35.5-29598.copr.26c43e4bcc.el8.x86_64
> NetworkManager-1.35.5-29598.copr.26c43e4bcc.el8.x86_64


thank you for your effort!! That's very useful.

I have a question. As I am not familiar with running a real BGP software, how busy is this system?

You write there are 90k routes (which is not small, but not huge). But how many routes are added/removed per minute? Is `ip monitor route` busy (during normal operation, not during startup)? Ultimately the question is, how much CPU time does NetworkManager "waste" in e.g. one hour?

Comment 29 Tomasz Kepczynski 2022-01-24 20:54:05 UTC
I've run:

  ip -ts monitor route | tee routes.log

for 2 minutes and it resulted in 1293 entries in the log file.

This is on the system with 1 IPv6 BGP feed from the Internet, 9 BGP feeds from https://dn42.net and 2 OSPFv3 neighbors. So far NetworkManager seems to behave very reasonably:

coen:~> ps -C NetworkManager u
USER         PID %CPU %MEM    VSZ   RSS TTY      STAT START   TIME COMMAND
root         722  0.3  0.8 382036  7940 ?        Ssl  15:08   1:14 /usr/sbin/NetworkManager --no-daemon

This is nothing compared to what I originally reported.

I have to mention one thing: I haven't moved to NetworkManager completely, it seems to be missing some wireguard functionality still. But this doesn't seem to be relevant to this case, as mentioned in comment #23, the distro provided NetworkManager got killed a few times with the same configuration.

Comment 30 Thomas Haller 2022-01-25 13:31:43 UTC
> for 2 minutes and it resulted in 1293 entries in the log file.

OK, that is rather busy (10/sec). It will mean, NetworkManager will constantly wake up and waste CPU time, which is a problem.

Thanks!!

Comment 31 Tomasz Kepczynski 2022-01-25 13:39:10 UTC
Yes, and for the normal BGP case one would expect at least two BGP feeds which would likely double that number. In my case it is single feed because it is an upstream to my other site (and one of the few).

Circling back to current NetworkManager usage:

coen:~> ps -C NetworkManager u
USER         PID %CPU %MEM    VSZ   RSS TTY      STAT START   TIME COMMAND
root         722  0.3  0.6 382384  6936 ?        Ssl  sty24   4:27 /usr/sbin/NetworkManager --no-daemon

and I am surprised to see RSS to go down since the restart. But that's good.

I don't think we need to wait for 24 hrs to elapse, it looks good.

Comment 32 Thomas Haller 2022-01-25 16:44:55 UTC
"TIME 4:27" (this is the total CPU time, right? 4 minutes).

When I read this correctly, you had process 722 running for more than 16 hours at that point (which would be 0.4% of one CPU).
Which is still a problem. Guess the only solution is an improved BPF filter.

Thanks.

Comment 33 Tomasz Kepczynski 2022-01-25 21:26:26 UTC
According to 'man ps' TIME is 'accumulated cpu time, user + system'.

%CPU seems to be what you are after.

I cannot say if 0.3/0.4% is too much or not.

Comment 34 Ajeco Support 2022-01-27 12:34:11 UTC
We can observe this problem also with IPv4 entries if there are a lot of them.

Comment 35 Filip Pokryvka 2022-02-07 14:40:06 UTC
The ipv6 test is failing with 2000000 routes, it takes 65 minutes. With 400000 it is few seconds, 500000 is nearly a minute. Also, NM seems to consume 100% of one CPU core, while `ip -b` only 10-20% CPU core (on 4 core machine). So, I mark this as failedQA, even though ipv4 version works fine. 

I have lowered ipv6 limit to 500000, which might be good indicator of fix (if it takes few seconds it is fine, if around minute it is too slow).

Comment 42 Filip Pokryvka 2022-03-11 12:12:10 UTC
(In reply to Filip Pokryvka from comment #35)
> The ipv6 test is failing with 2000000 routes, it takes 65 minutes. With
> 400000 it is few seconds, 500000 is nearly a minute. Also, NM seems to
> consume 100% of one CPU core, while `ip -b` only 10-20% CPU core (on 4 core
> machine). So, I mark this as failedQA, even though ipv4 version works fine. 
> 
> I have lowered ipv6 limit to 500000, which might be good indicator of fix
> (if it takes few seconds it is fine, if around minute it is too slow).

Verifying as IPv4 seems fixed and performance improved for 400 000 IPv6 routes it is bearable (performs like 2 000 000 IPv4 routes), cloning this to RHEL 8.7 to investigate IPv6 part and possibly improve to handle 2 000 000 IPv6 routes.

It is still notably faster when adding routes with NetworkManager stopped, that might be a race between `ip -b` and `NetworkManager` processes for some resources (the same kernel memory or interface), and NetworkManager uses even more CPU time than ip process, which is interesting.

Comment 47 errata-xmlrpc 2022-05-10 14:54:06 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (NetworkManager bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHEA-2022:1985


Note You need to log in before you can comment on or make changes to this bug.