Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 717850 - miss xmit_hash_policy=layer2+3 in modinfo bonding output
miss xmit_hash_policy=layer2+3 in modinfo bonding output
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: kernel (Show other bugs)
5.7
All All
unspecified Severity low
: rc
: ---
Assigned To: Weiping Pan
Petr Beňas
:
Depends On: 706018
Blocks:
  Show dependency treegraph
 
Reported: 2011-06-30 03:50 EDT by Liang Zheng
Modified: 2015-01-04 18:01 EST (History)
9 users (show)

See Also:
Fixed In Version: kernel-2.6.18-283.el5
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: 706018
Environment:
Last Closed: 2012-02-20 22:42:26 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:0150 normal SHIPPED_LIVE Moderate: Red Hat Enterprise Linux 5.8 kernel update 2012-02-21 02:35:24 EST

  None (edit)
Description Liang Zheng 2011-06-30 03:50:23 EDT
+++ This bug was initially created as a clone of Bug #706018 +++

Description of problem:
miss xmit_hash_policy=layer2+3 in modinfo bonding output

Version-Release number of selected component (if applicable):
2.6.32-131.0.15.el6

How reproducible:

Steps to Reproduce:
1.modinfo bonding | grep xmit_hash_policy

  
Actual results:
miss "2 for layer2+3 "

Expected results:


Additional info:
[root@hp-dl585g7-02 ~]# modinfo bonding | grep  xmit_hash_policy
parm:           xmit_hash_policy:XOR hashing method: 0 for layer 2 (default), 1 for layer 3+4 (charp)

--- Additional comment from wpan@redhat.com on 2011-05-25 06:07:16 EDT ---

Created attachment 500769 [details]
update xmit_hash_policy module parameter description

I send the patch to netdev@vger.kernel.org,
and wait for response.
Comment 1 Weiping Pan 2011-07-27 02:33:14 EDT
90e62474fd08e16ba5309886c801243b0eb782f3

This commit can resolve this bug.
Comment 2 Weiping Pan 2011-08-11 21:42:06 EDT
I've posted a patch to rh-kernel-list, and waiting for reviews.

http://post-office.corp.redhat.com/archives/rhkernel-list/2011-August/msg01304.html
Comment 3 RHEL Product and Program Management 2011-08-18 08:51:54 EDT
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux maintenance release.  Product Management has requested
further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed
products.  This request is not yet committed for inclusion in an Update
release.
Comment 6 Jarod Wilson 2011-08-30 15:23:13 EDT
Patch(es) available in kernel-2.6.18-283.el5
You can download this test kernel (or newer) from http://people.redhat.com/jwilson/el5
Detailed testing feedback is always welcomed.
Comment 8 Petr Beňas 2011-10-17 03:38:47 EDT
Reproduced in 2.6.18-282.el5 and verified in 2.6.18-283.el5.
Comment 9 errata-xmlrpc 2012-02-20 22:42:26 EST
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHSA-2012-0150.html

Note You need to log in before you can comment on or make changes to this bug.