Bug 17333 - Frequent ip_rt_bug WARNINGs generated in syslog with linux-3.0.0
: Frequent ip_rt_bug WARNINGs generated in syslog with linux-3.0.0
Status: UNCONFIRMED
Product: Logitech Media Server
Classification: Unclassified
Component: Platform Support
: 7.5.4
: PC Linux (other)
: -- major (vote)
: ---
Assigned To: Unassigned bug - please assign me!
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2011-07-24 05:27 UTC by Stuart Shelton
Modified: 2011-07-24 05:27 UTC (History)
0 users

See Also:
Category: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stuart Shelton 2011-07-24 05:27:17 UTC
SqueezeBoxServer's network discovery routines in (at least) Slim/Networking/Discovery/Server.pm and Slim/Plugin/xPL/Plugin.pm send a broadcast packet to 255.255.255.255.

However, when running on linux-3.0.0 this results in the following frequent output in syslog (where 10.1.128.61 is the local server):

ip_rt_bug: 10.1.128.61 -> 255.255.255.255, ?
------------[ cut here ]------------
WARNING: at net/ipv4/route.c:1677 ip_rt_bug+0x5b/0x62()
Hardware name: System Product Name
Modules linked in: coretemp appletalk psnap llc nfsd lockd nfs_acl sunrpc ipt_REJECT xt_tcpudp nf_conntrack_ipv4 nf_defrag_ipv4 xt_state iptable_filter xt_addrtype xt_dscp xt_iprange xt_DSCP xt_set ip_set nfnetlink ip_tables ip6table_filter xt_string xt_owner xt_multiport xt_hashlimit xt_conntrack xt_NFQUEUE xt_mark xt_connmark nf_conntrack ip6_tables x_tables ipv6 dm_mod raid456 async_pq async_xor xor async_memcpy async_raid6_recov raid6_pq async_tx r8168 ohci_hcd ehci_hcd usbcore sg i2c_nforce2 asus_atk0110 wmi i2c_core hwmon processor thermal_sys button unix [last unloaded: microcode]
Pid: 2205, comm: squeezeboxserve Tainted: G        W   3.0.0-gentoo #2
Call Trace:
 [<ffffffff81031ba5>] warn_slowpath_common+0x81/0x99
 [<ffffffff81031bd2>] warn_slowpath_null+0x15/0x17
 [<ffffffff8128c12f>] ip_rt_bug+0x5b/0x62
 [<ffffffff8129296f>] dst_output+0xf/0x11
 [<ffffffff81294153>] ip_local_out+0x1f/0x24
 [<ffffffff81294f80>] ip_send_skb+0x17/0x56
 [<ffffffff812af0be>] udp_send_skb+0x240/0x2a3
 [<ffffffff812b0031>] udp_sendmsg+0x561/0x793
 [<ffffffff81292bd0>] ? ip_select_ident+0x38/0x38
 [<ffffffff810c7b25>] ? __pollwait+0xc7/0xc7
 [<ffffffff810c7b25>] ? __pollwait+0xc7/0xc7
 [<ffffffff812b770c>] inet_sendmsg+0x61/0x6a
 [<ffffffff8125a346>] sock_sendmsg+0xdc/0xfc
 [<ffffffff81025e74>] ? should_resched+0x9/0x29
 [<ffffffff812d78ee>] ? _cond_resched+0x9/0x1d
 [<ffffffff810c77ae>] ? might_fault+0x9/0xb
 [<ffffffff810c7818>] ? set_fd_set+0x3b/0x45
 [<ffffffff810c83c9>] ? core_sys_select+0x1cb/0x211
 [<ffffffff812d78ee>] ? _cond_resched+0x9/0x1d
 [<ffffffff812589a6>] ? might_fault+0x9/0xb
 [<ffffffff812589d3>] ? copy_from_user+0x2b/0x2d
 [<ffffffff8125b75b>] sys_sendto+0x12b/0x16e
 [<ffffffff8125a3ce>] ? sockfd_lookup_light+0x1b/0x53
 [<ffffffff81007c3d>] ? read_tsc+0x9/0x19
 [<ffffffff8104ef1c>] ? timekeeping_get_ns+0x16/0x35
 [<ffffffff8125b98d>] ? sys_setsockopt+0x83/0x93
 [<ffffffff812d943b>] system_call_fastpath+0x16/0x1b
---[ end trace e4548e53179d322c ]---