[LU-8227] kernel update [RHEL6.8 2.6.32-642.1.1.el6] Created: 01/Jun/16  Updated: 12/Sep/16  Resolved: 14/Jun/16

Status: Resolved
Project: Lustre
Component/s: None
Affects Version/s: None
Fix Version/s: Lustre 2.9.0

Type: Bug Priority: Minor
Reporter: Bob Glossman (Inactive) Assignee: Bob Glossman (Inactive)
Resolution: Fixed Votes: 0
Labels: None

Issue Links:
Blocker
is blocked by LU-8126 new kernel [RHEL6.8 2.6.32-642.el6] Resolved
Related
Severity: 3
Rank (Obsolete): 9223372036854775807

 Description   
  • When a transparent proxy application was running and the number of established
    connections on the computer exceeded one million, unrelated processes, such as
    curl or ssh, were unable to bind to a local IP on the box to initiate a
    connection. The provided patch fixes the cooperation of the
    REUSEADDR/NOREUSEADDR socket option, and thus prevents the local port from being
    exhausted. As a result, the aforementioned bug no longer occurs in the described
    scenario. (BZ#1333571)
  • Previously, packets including the Common IP Security Option (CIPSO) label tag
    type 5 with certain category ranges were not read correctly. As a consequence,
    these packets were interpreted with the fallback security label. The provided
    patch fixes the netlbl_secattr_catmap_setrng() function, and thus fixes this
    bug. (BZ#1333579)
  • When hot removing or adding devices from a RAID1 array, the raid1d
    daemon could deadlock and become unresponsive in the freeze_array() function.
    The provided patch includes bio_end_io_list writes in the nr_queued variable to
    prevent the aforementioned hang from occurring. (BZ#1333576)


 Comments   
Comment by Gerrit Updater [ 01/Jun/16 ]

Bob Glossman (bob.glossman@intel.com) uploaded a new patch: http://review.whamcloud.com/20542
Subject: LU-8227 kernel: kernel update RHEL6.8 [2.6.32-642.1.1.el6]
Project: fs/lustre-release
Branch: master
Current Patch Set: 1
Commit: 1598b435f3bf83c8284dd6c3113a2a47108b0e7e

Comment by Gerrit Updater [ 14/Jun/16 ]

Oleg Drokin (oleg.drokin@intel.com) merged in patch http://review.whamcloud.com/20542/
Subject: LU-8227 kernel: kernel update RHEL6.8 [2.6.32-642.1.1.el6]
Project: fs/lustre-release
Branch: master
Current Patch Set:
Commit: fda7595bfec1e4f862e856da8c2b99c9f7fdd171

Comment by Joseph Gmitter (Inactive) [ 14/Jun/16 ]

patch has landed to master for 2.9

Comment by James A Simmons [ 16/Jun/16 ]

Can some back port this to b2_5_fe

Comment by Jian Yu [ 16/Jun/16 ]

Hi James,

Bob is back-porting the patch.

Comment by James A Simmons [ 22/Jun/16 ]

Just want to send out a warning. At ORNL we moved to this kernel and found a nasty kernel bug in the SRP code. So if you are running srp_login you might see your kernel crash on the bring up of your servers.

Comment by Bob Glossman (Inactive) [ 22/Jun/16 ]

James,
Thanks for the heads up. I don't think we've heard of this before. Is there an upstream bugzilla or other bug report we can follow on the issue?

Comment by James A Simmons [ 23/Jun/16 ]

https://bugzilla.redhat.com/show_bug.cgi?id=1321094
https://bugzilla.redhat.com/show_bug.cgi?id=1348062

Comment by Bob Glossman (Inactive) [ 23/Jun/16 ]

James,
Thanks, but can't see either of those bug reports. I just get:

You are not authorized to access bug #xxxxxxx.

Most likely the bug has been restricted for internal development processes and we cannot grant access.

Comment by James A Simmons [ 23/Jun/16 ]

Me too I guess only are admins have access to those bugs. I will keep you posted on the progress of this bug

Generated at Sat Feb 10 02:15:43 UTC 2024 using Jira 9.4.14#940014-sha1:734e6822bbf0d45eff9af51f82432957f73aa32c.