from dmesg: Aug 17 17:02:31 vpn-gw-int kernel: [507940.695531] ------------[ cut here ]------------ Aug 17 17:02:31 vpn-gw-int kernel: [507940.695558] WARNING: at net/ipv4/af_inet.c:154 inet_sock_destruct+0x164/0x1c0() Aug 17 17:02:31 vpn-gw-int kernel: [507940.695589] Hardware name: ProLiant DL360 G4p Aug 17 17:02:31 vpn-gw-int kernel: [507940.695607] Modules linked in: ipt_LOG xt_multiport tun xt_tcpudp xt_state iptable_nat nf_nat iptable_filter ip_tables x_tables nf_conntrack_ipv4 nf_defrag_ipv4 ipv6 psmouse nf_conntrack_ftp nf_conntrack tg3 libphy Aug 17 17:02:31 vpn-gw-int kernel: [507940.695697] Pid: 2314, comm: openvpn Not tainted 2.6.31-rc4 #1 Aug 17 17:02:31 vpn-gw-int kernel: [507940.695715] Call Trace: Aug 17 17:02:32 vpn-gw-int kernel: [507940.695734] [<c1269d64>] ? inet_sock_destruct+0x164/0x1c0 Aug 17 17:02:32 vpn-gw-int kernel: [507940.695756] [<c103252b>] ? warn_slowpath_common+0x6f/0xcd Aug 17 17:02:32 vpn-gw-int kernel: [507940.695777] [<c1269d64>] ? inet_sock_destruct+0x164/0x1c0 Aug 17 17:02:32 vpn-gw-int kernel: [507940.695796] [<c10325a9>] ? warn_slowpath_null+0x20/0x3c Aug 17 17:02:32 vpn-gw-int kernel: [507940.695817] [<c1269d64>] ? inet_sock_destruct+0x164/0x1c0 Aug 17 17:02:32 vpn-gw-int kernel: [507940.695838] [<c12889eb>] ? _spin_lock_bh+0x16/0x40 Aug 17 17:02:32 vpn-gw-int kernel: [507940.695857] [<c12889eb>] ? _spin_lock_bh+0x16/0x40 Aug 17 17:02:32 vpn-gw-int kernel: [507940.695877] [<c1219148>] ? __sk_free+0x21/0xd6 Aug 17 17:02:32 vpn-gw-int kernel: [507940.695896] [<c1219311>] ? sk_common_release+0x5b/0x97 Aug 17 17:02:32 vpn-gw-int kernel: [507940.695917] [<c1269815>] ? inet_release+0x39/0x66 Aug 17 17:02:32 vpn-gw-int kernel: [507940.695936] [<c121639a>] ? sock_release+0x22/0x8d Aug 17 17:02:32 vpn-gw-int kernel: [507940.695954] [<c1216421>] ? sock_close+0x1c/0x42 Aug 17 17:02:32 vpn-gw-int kernel: [507940.695975] [<c10a097c>] ? __fput+0xd6/0x1e0 Aug 17 17:02:32 vpn-gw-int kernel: [507940.695993] [<c109d454>] ? filp_close+0x41/0x72 Aug 17 17:02:32 vpn-gw-int kernel: [507940.696012] [<c109d4fa>] ? sys_close+0x75/0xc0 Aug 17 17:02:32 vpn-gw-int kernel: [507940.696032] [<c1002ecf>] ? sysenter_do_call+0x12/0x26 Aug 17 17:02:32 vpn-gw-int kernel: [507940.696049] ---[ end trace a2930464345011de ]--- Aug 17 17:03:01 vpn-gw-int kernel: [507970.165477] 172.28.33.133IN=tun0 OUT=eth0 SRC=172.28.33.133 DST=141.80.40.193 LEN=67 TOS=0x00 PREC=0x00 TTL=127 ID=23900 PROTO=UDP SPT=1026 DPT=53 LEN=47
This is not related to netfilter, please reclassify to networking.
I cannot do that according to bugzilla (which screams at me in red) You tried to change the Assignee field from networking_netfilter-iptables@kernel-bugs.osdl.org to acme@ghostprotocols.net , but only the assignee of the bug, or a user with the required permissions may change that field.
(switched to email. Please respond via emailed reply-to-all, not via the bugzilla web interface). On Tue, 18 Aug 2009 12:37:27 GMT bugzilla-daemon@bugzilla.kernel.org wrote: > http://bugzilla.kernel.org/show_bug.cgi?id=14002 > > Summary: WARNING: at net/ipv4/af_inet.c:154 > inet_sock_destruct+0x164/0x1c0() > Product: Networking > Version: 2.5 > Kernel Version: 2.6.31-rc4 > Platform: All > OS/Version: Linux > Tree: Mainline > Status: NEW > Severity: low > Priority: P1 > Component: Netfilter/Iptables > AssignedTo: networking_netfilter-iptables@kernel-bugs.osdl.org > ReportedBy: ralf.hildebrandt@charite.de > Regression: No I suspect this _is_ a regression. I'll mark it as such and will snitch to Rafael. > > from dmesg: > > Aug 17 17:02:31 vpn-gw-int kernel: [507940.695531] ------------[ cut here > ]------------ > Aug 17 17:02:31 vpn-gw-int kernel: [507940.695558] WARNING: at > net/ipv4/af_inet.c:154 inet_sock_destruct+0x164/0x1c0() In my 2.6.31-rc4 that is WARN_ON(sk->sk_forward_alloc); > Aug 17 17:02:31 vpn-gw-int kernel: [507940.695589] Hardware name: ProLiant > DL360 G4p > Aug 17 17:02:31 vpn-gw-int kernel: [507940.695607] Modules linked in: ipt_LOG > xt_multiport tun xt_tcpudp xt_state iptable_nat nf_nat iptable_filter > ip_tables > x_tables > nf_conntrack_ipv4 nf_defrag_ipv4 ipv6 psmouse nf_conntrack_ftp nf_conntrack > tg3 > libphy > Aug 17 17:02:31 vpn-gw-int kernel: [507940.695697] Pid: 2314, comm: openvpn > Not > tainted 2.6.31-rc4 #1 > Aug 17 17:02:31 vpn-gw-int kernel: [507940.695715] Call Trace: > Aug 17 17:02:32 vpn-gw-int kernel: [507940.695734] [<c1269d64>] ? > inet_sock_destruct+0x164/0x1c0 > Aug 17 17:02:32 vpn-gw-int kernel: [507940.695756] [<c103252b>] ? > warn_slowpath_common+0x6f/0xcd > Aug 17 17:02:32 vpn-gw-int kernel: [507940.695777] [<c1269d64>] ? > inet_sock_destruct+0x164/0x1c0 > Aug 17 17:02:32 vpn-gw-int kernel: [507940.695796] [<c10325a9>] ? > warn_slowpath_null+0x20/0x3c > Aug 17 17:02:32 vpn-gw-int kernel: [507940.695817] [<c1269d64>] ? > inet_sock_destruct+0x164/0x1c0 > Aug 17 17:02:32 vpn-gw-int kernel: [507940.695838] [<c12889eb>] ? > _spin_lock_bh+0x16/0x40 > Aug 17 17:02:32 vpn-gw-int kernel: [507940.695857] [<c12889eb>] ? > _spin_lock_bh+0x16/0x40 > Aug 17 17:02:32 vpn-gw-int kernel: [507940.695877] [<c1219148>] ? > __sk_free+0x21/0xd6 > Aug 17 17:02:32 vpn-gw-int kernel: [507940.695896] [<c1219311>] ? > sk_common_release+0x5b/0x97 > Aug 17 17:02:32 vpn-gw-int kernel: [507940.695917] [<c1269815>] ? > inet_release+0x39/0x66 > Aug 17 17:02:32 vpn-gw-int kernel: [507940.695936] [<c121639a>] ? > sock_release+0x22/0x8d > Aug 17 17:02:32 vpn-gw-int kernel: [507940.695954] [<c1216421>] ? > sock_close+0x1c/0x42 > Aug 17 17:02:32 vpn-gw-int kernel: [507940.695975] [<c10a097c>] ? > __fput+0xd6/0x1e0 > Aug 17 17:02:32 vpn-gw-int kernel: [507940.695993] [<c109d454>] ? > filp_close+0x41/0x72 > Aug 17 17:02:32 vpn-gw-int kernel: [507940.696012] [<c109d4fa>] ? > sys_close+0x75/0xc0 > Aug 17 17:02:32 vpn-gw-int kernel: [507940.696032] [<c1002ecf>] ? > sysenter_do_call+0x12/0x26 > Aug 17 17:02:32 vpn-gw-int kernel: [507940.696049] ---[ end trace > a2930464345011de ]--- > Aug 17 17:03:01 vpn-gw-int kernel: [507970.165477] 172.28.33.133IN=tun0 > OUT=eth0 SRC=172.28.33.133 DST=141.80.40.193 LEN=67 TOS=0x00 PREC=0x00 > TTL=127 > ID=23900 PROTO=UDP > SPT=1026 DPT=53 LEN=47 Is it reproducible? Still happening in current mainline? Thanks.
* Andrew Morton <akpm@linux-foundation.org>: > > Aug 17 17:03:01 vpn-gw-int kernel: [507970.165477] 172.28.33.133IN=tun0 > > OUT=eth0 SRC=172.28.33.133 DST=141.80.40.193 LEN=67 TOS=0x00 PREC=0x00 > TTL=127 > > ID=23900 PROTO=UDP > > SPT=1026 DPT=53 LEN=47 > > Is it reproducible? Still happening in current mainline? I updated to 2.6.31-rc6 and haven't (yet) seen it.
On Thursday 20 August 2009, John Dykstra wrote: > On Wed, 2009-08-19 at 22:20 +0200, Rafael J. Wysocki wrote: > > Bug-Entry : http://bugzilla.kernel.org/show_bug.cgi?id=14002 > > Subject : WARNING: at net/ipv4/af_inet.c:154 > > inet_sock_destruct+0x164/0x1c0() > > Submitter : Ralf Hildebrandt <ralf.hildebrandt@charite.de> > > Date : 2009-08-18 12:37 (2 days old) > > That looks similar to the WARNING discussed in [1]. > > There was no resolution to that thread. However, [2] points out > possible other occurrences of the problem in 2.6.27, 28 and 29. > > -- John > > [1] http://www.spinics.net/lists/netdev/msg103267.html > [2] http://www.spinics.net/lists/netdev/msg104120.html
Not a recent issue, dropping from the list of post-2.6.30 regressions, clearing the regression status.
So, yesterday it happened again, on 2.6.31-rc6: Sep 9 15:48:41 vpn-gw-int kernel: [1748973.529486] ------------[ cut here ]------------ Sep 9 15:48:41 vpn-gw-int kernel: [1748973.529523] WARNING: at net/ipv4/af_inet.c:154 inet_sock_destruct+0x164/0x1c0() Sep 9 15:48:41 vpn-gw-int kernel: [1748973.529554] Hardware name: ProLiant DL360 G4p Sep 9 15:48:41 vpn-gw-int kernel: [1748973.529572] Modules linked in: ipt_REJECT ipt_LOG xt_multiport tun xt_tcpudp xt_state iptable_nat nf_nat iptable_filter ip_tables x_tables nf_conntrack_ipv4 nf_defrag_ipv4 ipv6 psmouse nf_conntrack_ftp nf_conntrack tg3 libphy Sep 9 15:48:41 vpn-gw-int kernel: [1748973.529664] Pid: 9930, comm: openvpn Not tainted 2.6.31-rc6 #1 Sep 9 15:48:41 vpn-gw-int kernel: [1748973.529683] Call Trace: Sep 9 15:48:41 vpn-gw-int kernel: [1748973.529701] [<c126ce74>] ? inet_sock_destruct+0x164/0x1c0 Sep 9 15:48:41 vpn-gw-int kernel: [1748973.529724] [<c103273b>] ? warn_slowpath_common+0x6f/0xcd Sep 9 15:48:41 vpn-gw-int kernel: [1748973.529743] [<c126ce74>] ? inet_sock_destruct+0x164/0x1c0 Sep 9 15:48:41 vpn-gw-int kernel: [1748973.529762] [<c10327b9>] ? warn_slowpath_null+0x20/0x3c Sep 9 15:48:41 vpn-gw-int kernel: [1748973.529782] [<c126ce74>] ? inet_sock_destruct+0x164/0x1c0 Sep 9 15:48:41 vpn-gw-int kernel: [1748973.529803] [<c128badb>] ? _spin_lock_bh+0x16/0x40 Sep 9 15:48:41 vpn-gw-int kernel: [1748973.529822] [<c128badb>] ? _spin_lock_bh+0x16/0x40 Sep 9 15:48:41 vpn-gw-int kernel: [1748973.529842] [<c121b9d8>] ? __sk_free+0x21/0xd6 Sep 9 15:48:41 vpn-gw-int kernel: [1748973.529861] [<c121bba1>] ? sk_common_release+0x5b/0x97 Sep 9 15:48:41 vpn-gw-int kernel: [1748973.529883] [<c126c925>] ? inet_release+0x39/0x66 Sep 9 15:48:41 vpn-gw-int kernel: [1748973.529902] [<c1218bfa>] ? sock_release+0x22/0x8d Sep 9 15:48:41 vpn-gw-int kernel: [1748973.529920] [<c1218c81>] ? sock_close+0x1c/0x42 Sep 9 15:48:41 vpn-gw-int kernel: [1748973.529941] [<c10a122c>] ? __fput+0xd6/0x1e0 Sep 9 15:48:41 vpn-gw-int kernel: [1748973.529959] [<c109dd04>] ? filp_close+0x41/0x72 Sep 9 15:48:41 vpn-gw-int kernel: [1748973.529979] [<c109ddaa>] ? sys_close+0x75/0xc0 Sep 9 15:48:41 vpn-gw-int kernel: [1748973.529997] [<c1002f44>] ? syscall_call+0x7/0xb Sep 9 15:48:41 vpn-gw-int kernel: [1748973.530015] ---[ end trace 099d9efaee7ae8ea ]--- I'm able to reproduce it (I think) whenever I kill openvpn...
The net developers don't look at bugzilla. That's why I said (switched to email. Please respond via emailed reply-to-all, not via the bugzilla web interface).