Note: This bug is displayed in read-only format because
the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
When the netconsole module was configured over bridge and the "service network restart" command was executed, a deadlock could occur, resulting in a kernel panic. This was caused by recursive rtnl locking by both bridge and netconsole code during network interface unregistration. With this update, the rtnl lock usage is fixed, and the kernel no longer crashes in this scenario.
Cannot reproduce; what are the exact steps to reproduce on (pure) RHEL? Any bridges involved, etc.?
What kernel version was used to capture the trace in attachment 587619[details]?
Hmm, never mind, 3b410a310b48a8e7de3438957635093596ad5ca5 fixes this bug.
If you could still describe the setup used to reproduce this, it would be nice.
(In reply to comment #3)
> Hmm, never mind, 3b410a310b48a8e7de3438957635093596ad5ca5 fixes this bug.
In what tree can I find this commit?
> If you could still describe the setup used to reproduce this, it would be
> nice.
It is a plain RHEL system (VM) with kernel 2.6.32-279 and a bridge with one slave device.
Do you need more details?
(In reply to comment #4)
> In what tree can I find this commit?
Upstream vanilla, I'm backporting and testing the patch now.
> It is a plain RHEL system (VM) with kernel 2.6.32-279 and a bridge with one
> slave device.
> Do you need more details?
No, seems that I reproduced it. Thanks!
Comment 7RHEL Program Management
2012-07-20 12:00:21 UTC
This request was evaluated by Red Hat Product Management for
inclusion in a Red Hat Enterprise Linux release. Product
Management has requested further review of this request by
Red Hat Engineering, for potential inclusion in a Red Hat
Enterprise Linux release for currently deployed products.
This request is not yet committed for inclusion in a release.
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.
For information on the advisory, and where to find the updated
files, follow the link below.
If the solution does not work for you, open a new bug report.
http://rhn.redhat.com/errata/RHSA-2013-0496.html
Cannot reproduce; what are the exact steps to reproduce on (pure) RHEL? Any bridges involved, etc.? What kernel version was used to capture the trace in attachment 587619 [details]?