Bug 14002 - WARNING: at net/ipv4/af_inet.c:154 inet_sock_destruct+0x164/0x1c0()
Summary: WARNING: at net/ipv4/af_inet.c:154 inet_sock_destruct+0x164/0x1c0()
Status: CLOSED OBSOLETE
Alias: None
Product: Networking
Classification: Unclassified
Component: IPV4 (show other bugs)
Hardware: All Linux
: P1 low
Assignee: Stephen Hemminger
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2009-08-18 12:37 UTC by Ralf Hildebrandt
Modified: 2012-06-13 15:21 UTC (History)
4 users (show)

See Also:
Kernel Version: 2.6.31-rc6
Subsystem:
Regression: No
Bisected commit-id:


Attachments

Description Ralf Hildebrandt 2009-08-18 12:37:24 UTC
from dmesg:

Aug 17 17:02:31 vpn-gw-int kernel: [507940.695531] ------------[ cut here ]------------
Aug 17 17:02:31 vpn-gw-int kernel: [507940.695558] WARNING: at net/ipv4/af_inet.c:154 inet_sock_destruct+0x164/0x1c0()
Aug 17 17:02:31 vpn-gw-int kernel: [507940.695589] Hardware name: ProLiant DL360 G4p
Aug 17 17:02:31 vpn-gw-int kernel: [507940.695607] Modules linked in: ipt_LOG xt_multiport tun xt_tcpudp xt_state iptable_nat nf_nat iptable_filter ip_tables x_tables
nf_conntrack_ipv4 nf_defrag_ipv4 ipv6 psmouse nf_conntrack_ftp nf_conntrack tg3 libphy
Aug 17 17:02:31 vpn-gw-int kernel: [507940.695697] Pid: 2314, comm: openvpn Not tainted 2.6.31-rc4 #1
Aug 17 17:02:31 vpn-gw-int kernel: [507940.695715] Call Trace:
Aug 17 17:02:32 vpn-gw-int kernel: [507940.695734]  [<c1269d64>] ? inet_sock_destruct+0x164/0x1c0
Aug 17 17:02:32 vpn-gw-int kernel: [507940.695756]  [<c103252b>] ? warn_slowpath_common+0x6f/0xcd
Aug 17 17:02:32 vpn-gw-int kernel: [507940.695777]  [<c1269d64>] ? inet_sock_destruct+0x164/0x1c0
Aug 17 17:02:32 vpn-gw-int kernel: [507940.695796]  [<c10325a9>] ? warn_slowpath_null+0x20/0x3c
Aug 17 17:02:32 vpn-gw-int kernel: [507940.695817]  [<c1269d64>] ? inet_sock_destruct+0x164/0x1c0
Aug 17 17:02:32 vpn-gw-int kernel: [507940.695838]  [<c12889eb>] ? _spin_lock_bh+0x16/0x40
Aug 17 17:02:32 vpn-gw-int kernel: [507940.695857]  [<c12889eb>] ? _spin_lock_bh+0x16/0x40
Aug 17 17:02:32 vpn-gw-int kernel: [507940.695877]  [<c1219148>] ? __sk_free+0x21/0xd6
Aug 17 17:02:32 vpn-gw-int kernel: [507940.695896]  [<c1219311>] ? sk_common_release+0x5b/0x97
Aug 17 17:02:32 vpn-gw-int kernel: [507940.695917]  [<c1269815>] ? inet_release+0x39/0x66
Aug 17 17:02:32 vpn-gw-int kernel: [507940.695936]  [<c121639a>] ? sock_release+0x22/0x8d
Aug 17 17:02:32 vpn-gw-int kernel: [507940.695954]  [<c1216421>] ? sock_close+0x1c/0x42
Aug 17 17:02:32 vpn-gw-int kernel: [507940.695975]  [<c10a097c>] ? __fput+0xd6/0x1e0
Aug 17 17:02:32 vpn-gw-int kernel: [507940.695993]  [<c109d454>] ? filp_close+0x41/0x72
Aug 17 17:02:32 vpn-gw-int kernel: [507940.696012]  [<c109d4fa>] ? sys_close+0x75/0xc0
Aug 17 17:02:32 vpn-gw-int kernel: [507940.696032]  [<c1002ecf>] ? sysenter_do_call+0x12/0x26
Aug 17 17:02:32 vpn-gw-int kernel: [507940.696049] ---[ end trace a2930464345011de ]---
Aug 17 17:03:01 vpn-gw-int kernel: [507970.165477] 172.28.33.133IN=tun0 OUT=eth0 SRC=172.28.33.133 DST=141.80.40.193 LEN=67 TOS=0x00 PREC=0x00 TTL=127 ID=23900 PROTO=UDP
SPT=1026 DPT=53 LEN=47
Comment 1 Patrick McHardy 2009-08-18 12:40:04 UTC
This is not related to netfilter, please reclassify to networking.
Comment 2 Ralf Hildebrandt 2009-08-18 12:46:33 UTC
I cannot do that according to bugzilla (which screams at me in red)

You tried to change the Assignee field from networking_netfilter-iptables@kernel-bugs.osdl.org  to acme@ghostprotocols.net  , but only the assignee of the bug, or a user with the required permissions may change that field.
Comment 3 Andrew Morton 2009-08-19 21:21:49 UTC
(switched to email.  Please respond via emailed reply-to-all, not via the
bugzilla web interface).

On Tue, 18 Aug 2009 12:37:27 GMT bugzilla-daemon@bugzilla.kernel.org wrote:

> http://bugzilla.kernel.org/show_bug.cgi?id=14002
> 
>            Summary: WARNING: at net/ipv4/af_inet.c:154
>                     inet_sock_destruct+0x164/0x1c0()
>            Product: Networking
>            Version: 2.5
>     Kernel Version: 2.6.31-rc4
>           Platform: All
>         OS/Version: Linux
>               Tree: Mainline
>             Status: NEW
>           Severity: low
>           Priority: P1
>          Component: Netfilter/Iptables
>         AssignedTo: networking_netfilter-iptables@kernel-bugs.osdl.org
>         ReportedBy: ralf.hildebrandt@charite.de
>         Regression: No

I suspect this _is_ a regression.  I'll mark it as such and will snitch
to Rafael.


> 
> from dmesg:
> 
> Aug 17 17:02:31 vpn-gw-int kernel: [507940.695531] ------------[ cut here
> ]------------
> Aug 17 17:02:31 vpn-gw-int kernel: [507940.695558] WARNING: at
> net/ipv4/af_inet.c:154 inet_sock_destruct+0x164/0x1c0()

In my 2.6.31-rc4 that is

	WARN_ON(sk->sk_forward_alloc);

> Aug 17 17:02:31 vpn-gw-int kernel: [507940.695589] Hardware name: ProLiant
> DL360 G4p
> Aug 17 17:02:31 vpn-gw-int kernel: [507940.695607] Modules linked in: ipt_LOG
> xt_multiport tun xt_tcpudp xt_state iptable_nat nf_nat iptable_filter
> ip_tables
> x_tables
> nf_conntrack_ipv4 nf_defrag_ipv4 ipv6 psmouse nf_conntrack_ftp nf_conntrack
> tg3
> libphy
> Aug 17 17:02:31 vpn-gw-int kernel: [507940.695697] Pid: 2314, comm: openvpn
> Not
> tainted 2.6.31-rc4 #1
> Aug 17 17:02:31 vpn-gw-int kernel: [507940.695715] Call Trace:
> Aug 17 17:02:32 vpn-gw-int kernel: [507940.695734]  [<c1269d64>] ?
> inet_sock_destruct+0x164/0x1c0
> Aug 17 17:02:32 vpn-gw-int kernel: [507940.695756]  [<c103252b>] ?
> warn_slowpath_common+0x6f/0xcd
> Aug 17 17:02:32 vpn-gw-int kernel: [507940.695777]  [<c1269d64>] ?
> inet_sock_destruct+0x164/0x1c0
> Aug 17 17:02:32 vpn-gw-int kernel: [507940.695796]  [<c10325a9>] ?
> warn_slowpath_null+0x20/0x3c
> Aug 17 17:02:32 vpn-gw-int kernel: [507940.695817]  [<c1269d64>] ?
> inet_sock_destruct+0x164/0x1c0
> Aug 17 17:02:32 vpn-gw-int kernel: [507940.695838]  [<c12889eb>] ?
> _spin_lock_bh+0x16/0x40
> Aug 17 17:02:32 vpn-gw-int kernel: [507940.695857]  [<c12889eb>] ?
> _spin_lock_bh+0x16/0x40
> Aug 17 17:02:32 vpn-gw-int kernel: [507940.695877]  [<c1219148>] ?
> __sk_free+0x21/0xd6
> Aug 17 17:02:32 vpn-gw-int kernel: [507940.695896]  [<c1219311>] ?
> sk_common_release+0x5b/0x97
> Aug 17 17:02:32 vpn-gw-int kernel: [507940.695917]  [<c1269815>] ?
> inet_release+0x39/0x66
> Aug 17 17:02:32 vpn-gw-int kernel: [507940.695936]  [<c121639a>] ?
> sock_release+0x22/0x8d
> Aug 17 17:02:32 vpn-gw-int kernel: [507940.695954]  [<c1216421>] ?
> sock_close+0x1c/0x42
> Aug 17 17:02:32 vpn-gw-int kernel: [507940.695975]  [<c10a097c>] ?
> __fput+0xd6/0x1e0
> Aug 17 17:02:32 vpn-gw-int kernel: [507940.695993]  [<c109d454>] ?
> filp_close+0x41/0x72
> Aug 17 17:02:32 vpn-gw-int kernel: [507940.696012]  [<c109d4fa>] ?
> sys_close+0x75/0xc0
> Aug 17 17:02:32 vpn-gw-int kernel: [507940.696032]  [<c1002ecf>] ?
> sysenter_do_call+0x12/0x26
> Aug 17 17:02:32 vpn-gw-int kernel: [507940.696049] ---[ end trace
> a2930464345011de ]---
> Aug 17 17:03:01 vpn-gw-int kernel: [507970.165477] 172.28.33.133IN=tun0
> OUT=eth0 SRC=172.28.33.133 DST=141.80.40.193 LEN=67 TOS=0x00 PREC=0x00
> TTL=127
> ID=23900 PROTO=UDP
> SPT=1026 DPT=53 LEN=47

Is it reproducible?  Still happening in current mainline?

Thanks.
Comment 4 Ralf Hildebrandt 2009-08-20 08:49:42 UTC
* Andrew Morton <akpm@linux-foundation.org>:

> > Aug 17 17:03:01 vpn-gw-int kernel: [507970.165477] 172.28.33.133IN=tun0
> > OUT=eth0 SRC=172.28.33.133 DST=141.80.40.193 LEN=67 TOS=0x00 PREC=0x00
> TTL=127
> > ID=23900 PROTO=UDP
> > SPT=1026 DPT=53 LEN=47
> 
> Is it reproducible?  Still happening in current mainline?

I updated to 2.6.31-rc6 and haven't (yet) seen it.
Comment 5 Rafael J. Wysocki 2009-08-20 21:24:32 UTC
On Thursday 20 August 2009, John Dykstra wrote:
> On Wed, 2009-08-19 at 22:20 +0200, Rafael J. Wysocki wrote:
> > Bug-Entry       : http://bugzilla.kernel.org/show_bug.cgi?id=14002
> > Subject         : WARNING: at net/ipv4/af_inet.c:154
> > inet_sock_destruct+0x164/0x1c0()
> > Submitter       : Ralf Hildebrandt <ralf.hildebrandt@charite.de>
> > Date            : 2009-08-18 12:37 (2 days old)
> 
> That looks similar to the WARNING discussed in [1].
> 
> There was no resolution to that thread.  However, [2] points out
> possible other occurrences of the problem in 2.6.27, 28 and 29.
> 
> --  John
> 
> [1]  http://www.spinics.net/lists/netdev/msg103267.html
> [2]  http://www.spinics.net/lists/netdev/msg104120.html
Comment 6 Rafael J. Wysocki 2009-08-20 21:30:59 UTC
Not a recent issue, dropping from the list of post-2.6.30 regressions, clearing the regression status.
Comment 7 Ralf Hildebrandt 2009-09-10 09:36:14 UTC
So, yesterday it happened again, on 2.6.31-rc6:

Sep  9 15:48:41 vpn-gw-int kernel: [1748973.529486] ------------[ cut here ]------------
Sep  9 15:48:41 vpn-gw-int kernel: [1748973.529523] WARNING: at net/ipv4/af_inet.c:154 inet_sock_destruct+0x164/0x1c0()
Sep  9 15:48:41 vpn-gw-int kernel: [1748973.529554] Hardware name: ProLiant DL360 G4p
Sep  9 15:48:41 vpn-gw-int kernel: [1748973.529572] Modules linked in: ipt_REJECT ipt_LOG xt_multiport tun xt_tcpudp xt_state iptable_nat nf_nat iptable_filter ip_tables x_tables nf_conntrack_ipv4 nf_defrag_ipv4 ipv6 psmouse nf_conntrack_ftp nf_conntrack tg3 libphy
Sep  9 15:48:41 vpn-gw-int kernel: [1748973.529664] Pid: 9930, comm: openvpn Not tainted 2.6.31-rc6 #1
Sep  9 15:48:41 vpn-gw-int kernel: [1748973.529683] Call Trace:
Sep  9 15:48:41 vpn-gw-int kernel: [1748973.529701]  [<c126ce74>] ? inet_sock_destruct+0x164/0x1c0
Sep  9 15:48:41 vpn-gw-int kernel: [1748973.529724]  [<c103273b>] ? warn_slowpath_common+0x6f/0xcd
Sep  9 15:48:41 vpn-gw-int kernel: [1748973.529743]  [<c126ce74>] ? inet_sock_destruct+0x164/0x1c0
Sep  9 15:48:41 vpn-gw-int kernel: [1748973.529762]  [<c10327b9>] ? warn_slowpath_null+0x20/0x3c
Sep  9 15:48:41 vpn-gw-int kernel: [1748973.529782]  [<c126ce74>] ? inet_sock_destruct+0x164/0x1c0
Sep  9 15:48:41 vpn-gw-int kernel: [1748973.529803]  [<c128badb>] ? _spin_lock_bh+0x16/0x40
Sep  9 15:48:41 vpn-gw-int kernel: [1748973.529822]  [<c128badb>] ? _spin_lock_bh+0x16/0x40
Sep  9 15:48:41 vpn-gw-int kernel: [1748973.529842]  [<c121b9d8>] ? __sk_free+0x21/0xd6
Sep  9 15:48:41 vpn-gw-int kernel: [1748973.529861]  [<c121bba1>] ? sk_common_release+0x5b/0x97
Sep  9 15:48:41 vpn-gw-int kernel: [1748973.529883]  [<c126c925>] ? inet_release+0x39/0x66
Sep  9 15:48:41 vpn-gw-int kernel: [1748973.529902]  [<c1218bfa>] ? sock_release+0x22/0x8d
Sep  9 15:48:41 vpn-gw-int kernel: [1748973.529920]  [<c1218c81>] ? sock_close+0x1c/0x42
Sep  9 15:48:41 vpn-gw-int kernel: [1748973.529941]  [<c10a122c>] ? __fput+0xd6/0x1e0
Sep  9 15:48:41 vpn-gw-int kernel: [1748973.529959]  [<c109dd04>] ? filp_close+0x41/0x72
Sep  9 15:48:41 vpn-gw-int kernel: [1748973.529979]  [<c109ddaa>] ? sys_close+0x75/0xc0
Sep  9 15:48:41 vpn-gw-int kernel: [1748973.529997]  [<c1002f44>] ? syscall_call+0x7/0xb
Sep  9 15:48:41 vpn-gw-int kernel: [1748973.530015] ---[ end trace 099d9efaee7ae8ea ]---

I'm able to reproduce it (I think) whenever I kill openvpn...
Comment 8 Andrew Morton 2009-09-10 22:13:47 UTC
The net developers don't look at bugzilla.  That's why I said

(switched to email.  Please respond via emailed reply-to-all, not via the
bugzilla web interface).

Note You need to log in before you can comment on or make changes to this bug.