lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 03 Aug 2009 19:38:01 -0500
From:	John Dykstra <john.dykstra1@...il.com>
To:	Tomasz Chmielewski <mangoo@...g.org>,
	David Miller <davem@...emloft.net>
Cc:	netdev@...r.kernel.org, eric.dumazet@...il.com
Subject: Re: WARNING: at net/ipv4/af_inet.c:155
	inet_sock_destruct+0x122/0x13a()

On Mon, 2009-08-03 at 10:30 +0200, Tomasz Chmielewski wrote:
> After upgrading from 2.6.29.1 to 2.6.30.4, I'm getting these warnings in dmesg.
> 
> Let me know if you need more info.
> 
> Other than that, the device seems to work stable.
> 
> ------------[ cut here ]------------
> WARNING: at net/ipv4/af_inet.c:155 inet_sock_destruct+0x122/0x13a()
> Hardware name: Altos G510
> Modules linked in: nfs nfsd lockd nfs_acl auth_rpcgss sunrpc exportfs tun bitrev crc32 bonding lm75 adm9240 adm1026 hwmon_vid hwmon i2c_piix4 i2c_core dm_crypt dm_mirror dm_region_hash dm_log dm_snapshot dm_mod e1000 tg3 libphy
> Pid: 2222, comm: openvpn Not tainted 2.6.30.4-1 #4
> Call Trace:
>  [<4011f018>] ? warn_slowpath_common+0x5e/0x8a
>  [<4011f04e>] ? warn_slowpath_null+0xa/0xc
>  [<402b5d64>] ? inet_sock_destruct+0x122/0x13a
>  [<402796a4>] ? sk_free+0x10/0xa7
>  [<402b5964>] ? inet_release+0x3f/0x44
>  [<4027751b>] ? sock_release+0x11/0x52
>  [<40277575>] ? sock_close+0x19/0x1c
>  [<40164026>] ? __fput+0xa6/0x149
>  [<40161989>] ? filp_close+0x4e/0x54
>  [<401619f5>] ? sys_close+0x66/0x9c
>  [<401027c8>] ? sysenter_do_call+0x12/0x26
> ---[ end trace bdfe445acbab5307 ]---
> ------------[ cut here ]------------
> WARNING: at net/ipv4/af_inet.c:155 inet_sock_destruct+0x122/0x13a()
> Hardware name: Altos G510
> Modules linked in: nfs nfsd lockd nfs_acl auth_rpcgss sunrpc exportfs tun bitrev crc32 bonding lm75 adm9240 adm1026 hwmon_vid hwmon i2c_piix4 i2c_core dm_crypt dm_mirror dm_region_hash dm_log dm_snapshot dm_mod e1000 tg3 libphy
> Pid: 2222, comm: openvpn Tainted: G        W  2.6.30.4-1 #4
> Call Trace:
>  [<4011f018>] ? warn_slowpath_common+0x5e/0x8a
>  [<4011f04e>] ? warn_slowpath_null+0xa/0xc
>  [<402b5d64>] ? inet_sock_destruct+0x122/0x13a
>  [<402796a4>] ? sk_free+0x10/0xa7
>  [<402b5964>] ? inet_release+0x3f/0x44
>  [<4027751b>] ? sock_release+0x11/0x52
>  [<40277575>] ? sock_close+0x19/0x1c
>  [<40164026>] ? __fput+0xa6/0x149
>  [<40161989>] ? filp_close+0x4e/0x54
>  [<401619f5>] ? sys_close+0x66/0x9c
>  [<401027c8>] ? sysenter_do_call+0x12/0x26
> ---[ end trace bdfe445acbab5308 ]---
> ------------[ cut here ]------------
> WARNING: at net/ipv4/af_inet.c:155 inet_sock_destruct+0x122/0x13a()
> Hardware name: Altos G510
> Modules linked in: nfs nfsd lockd nfs_acl auth_rpcgss sunrpc exportfs tun bitrev crc32 bonding lm75 adm9240 adm1026 hwmon_vid hwmon i2c_piix4 i2c_core dm_crypt dm_mirror dm_region_hash dm_log dm_snapshot dm_mod e1000 tg3 libphy
> Pid: 2222, comm: openvpn Tainted: G        W  2.6.30.4-1 #4
> Call Trace:
>  [<4011f018>] ? warn_slowpath_common+0x5e/0x8a
>  [<4011f04e>] ? warn_slowpath_null+0xa/0xc
>  [<402b5d64>] ? inet_sock_destruct+0x122/0x13a
>  [<402796a4>] ? sk_free+0x10/0xa7
>  [<402b5964>] ? inet_release+0x3f/0x44
>  [<4027751b>] ? sock_release+0x11/0x52
>  [<40277575>] ? sock_close+0x19/0x1c
>  [<40164026>] ? __fput+0xa6/0x149
>  [<40161989>] ? filp_close+0x4e/0x54
>  [<401619f5>] ? sys_clos+0x66/0x9c
>  [<401027c8>] ? sysenter_do_call+0x12/0x26
> ---[ end trace bdfe445acbab5309 ]---

Thanks for the report, Tomasz.  

There's a good chance e51a67a9c8a2ea5c563f8c2ba6613fe2100ffe67 from the
current mainline will fix this problem.

Dave, Eric's fix might be a candidate for -stable.  The symptom is
usually a WARN, but the impact is significant.

  --  John

--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ