[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1249346282.6479.5.camel@merlyn>
Date: Mon, 03 Aug 2009 19:38:01 -0500
From: John Dykstra <john.dykstra1@...il.com>
To: Tomasz Chmielewski <mangoo@...g.org>,
David Miller <davem@...emloft.net>
Cc: netdev@...r.kernel.org, eric.dumazet@...il.com
Subject: Re: WARNING: at net/ipv4/af_inet.c:155
inet_sock_destruct+0x122/0x13a()
On Mon, 2009-08-03 at 10:30 +0200, Tomasz Chmielewski wrote:
> After upgrading from 2.6.29.1 to 2.6.30.4, I'm getting these warnings in dmesg.
>
> Let me know if you need more info.
>
> Other than that, the device seems to work stable.
>
> ------------[ cut here ]------------
> WARNING: at net/ipv4/af_inet.c:155 inet_sock_destruct+0x122/0x13a()
> Hardware name: Altos G510
> Modules linked in: nfs nfsd lockd nfs_acl auth_rpcgss sunrpc exportfs tun bitrev crc32 bonding lm75 adm9240 adm1026 hwmon_vid hwmon i2c_piix4 i2c_core dm_crypt dm_mirror dm_region_hash dm_log dm_snapshot dm_mod e1000 tg3 libphy
> Pid: 2222, comm: openvpn Not tainted 2.6.30.4-1 #4
> Call Trace:
> [<4011f018>] ? warn_slowpath_common+0x5e/0x8a
> [<4011f04e>] ? warn_slowpath_null+0xa/0xc
> [<402b5d64>] ? inet_sock_destruct+0x122/0x13a
> [<402796a4>] ? sk_free+0x10/0xa7
> [<402b5964>] ? inet_release+0x3f/0x44
> [<4027751b>] ? sock_release+0x11/0x52
> [<40277575>] ? sock_close+0x19/0x1c
> [<40164026>] ? __fput+0xa6/0x149
> [<40161989>] ? filp_close+0x4e/0x54
> [<401619f5>] ? sys_close+0x66/0x9c
> [<401027c8>] ? sysenter_do_call+0x12/0x26
> ---[ end trace bdfe445acbab5307 ]---
> ------------[ cut here ]------------
> WARNING: at net/ipv4/af_inet.c:155 inet_sock_destruct+0x122/0x13a()
> Hardware name: Altos G510
> Modules linked in: nfs nfsd lockd nfs_acl auth_rpcgss sunrpc exportfs tun bitrev crc32 bonding lm75 adm9240 adm1026 hwmon_vid hwmon i2c_piix4 i2c_core dm_crypt dm_mirror dm_region_hash dm_log dm_snapshot dm_mod e1000 tg3 libphy
> Pid: 2222, comm: openvpn Tainted: G W 2.6.30.4-1 #4
> Call Trace:
> [<4011f018>] ? warn_slowpath_common+0x5e/0x8a
> [<4011f04e>] ? warn_slowpath_null+0xa/0xc
> [<402b5d64>] ? inet_sock_destruct+0x122/0x13a
> [<402796a4>] ? sk_free+0x10/0xa7
> [<402b5964>] ? inet_release+0x3f/0x44
> [<4027751b>] ? sock_release+0x11/0x52
> [<40277575>] ? sock_close+0x19/0x1c
> [<40164026>] ? __fput+0xa6/0x149
> [<40161989>] ? filp_close+0x4e/0x54
> [<401619f5>] ? sys_close+0x66/0x9c
> [<401027c8>] ? sysenter_do_call+0x12/0x26
> ---[ end trace bdfe445acbab5308 ]---
> ------------[ cut here ]------------
> WARNING: at net/ipv4/af_inet.c:155 inet_sock_destruct+0x122/0x13a()
> Hardware name: Altos G510
> Modules linked in: nfs nfsd lockd nfs_acl auth_rpcgss sunrpc exportfs tun bitrev crc32 bonding lm75 adm9240 adm1026 hwmon_vid hwmon i2c_piix4 i2c_core dm_crypt dm_mirror dm_region_hash dm_log dm_snapshot dm_mod e1000 tg3 libphy
> Pid: 2222, comm: openvpn Tainted: G W 2.6.30.4-1 #4
> Call Trace:
> [<4011f018>] ? warn_slowpath_common+0x5e/0x8a
> [<4011f04e>] ? warn_slowpath_null+0xa/0xc
> [<402b5d64>] ? inet_sock_destruct+0x122/0x13a
> [<402796a4>] ? sk_free+0x10/0xa7
> [<402b5964>] ? inet_release+0x3f/0x44
> [<4027751b>] ? sock_release+0x11/0x52
> [<40277575>] ? sock_close+0x19/0x1c
> [<40164026>] ? __fput+0xa6/0x149
> [<40161989>] ? filp_close+0x4e/0x54
> [<401619f5>] ? sys_clos+0x66/0x9c
> [<401027c8>] ? sysenter_do_call+0x12/0x26
> ---[ end trace bdfe445acbab5309 ]---
Thanks for the report, Tomasz.
There's a good chance e51a67a9c8a2ea5c563f8c2ba6613fe2100ffe67 from the
current mainline will fix this problem.
Dave, Eric's fix might be a candidate for -stable. The symptom is
usually a WARN, but the impact is significant.
-- John
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists