Bug 21452 - WARNING: at net/ipv4/devinet.c:136
Summary: WARNING: at net/ipv4/devinet.c:136
Status: RESOLVED OBSOLETE
Alias: None
Product: Networking
Classification: Unclassified
Component: IPV4 (show other bugs)
Hardware: i386 Linux
: P1 normal
Assignee: Stephen Hemminger
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2010-10-30 11:55 UTC by Shu
Modified: 2012-08-14 11:29 UTC (History)
2 users (show)

See Also:
Kernel Version: 2.6.36
Subsystem:
Regression: No
Bisected commit-id:


Attachments

Description Shu 2010-10-30 11:55:02 UTC
------------[ cut here ]------------
WARNING: at net/ipv4/devinet.c:136 in_dev_finish_destroy+0x4d/0x80()
Hardware name: KT400-8235
Modules linked in: tun nls_utf8 cifs pppoe pppox ppp_generic slhc iptable_mangle xt_TCPMSS xt_recent ipt_REJECT xt_tcpudp xt_state iptable_filter ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4 ip_tables x_tables sg dm_mod sd_mod
Pid: 3, comm: ksoftirqd/0 Tainted: G        W   2.6.36-08965-g2d3b07c-dirty #1
Call Trace:
 [<c10251a8>] ? warn_slowpath_common+0x78/0xb0
 [<c13ca3bd>] ? in_dev_finish_destroy+0x4d/0x80
 [<c13ca3bd>] ? in_dev_finish_destroy+0x4d/0x80
 [<c10251fb>] ? warn_slowpath_null+0x1b/0x20
 [<c13ca3bd>] ? in_dev_finish_destroy+0x4d/0x80
 [<c1383a30>] ? dst_destroy+0x80/0x100
 [<c1383a14>] ? dst_destroy+0x64/0x100
 [<c139c86f>] ? dst_rcu_free+0x1f/0x30
 [<c1063ff2>] ? __rcu_process_callbacks+0xe2/0x2b0
 [<c10641de>] ? rcu_process_callbacks+0x1e/0x30
 [<c102a5bc>] ? __do_softirq+0x6c/0xf0
 [<c102a550>] ? __do_softirq+0x0/0xf0
 <IRQ>  [<c102a1dd>] ? run_ksoftirqd+0x5d/0x130
 [<c102a180>] ? run_ksoftirqd+0x0/0x130
 [<c103c084>] ? kthread+0x74/0x80
 [<c103c010>] ? kthread+0x0/0x80
 [<c100313e>] ? kernel_thread_helper+0x6/0x18
---[ end trace 522231bc5fee959e ]---
------------[ cut here ]------------
WARNING: at net/ipv4/devinet.c:137 in_dev_finish_destroy+0x7a/0x80()
Hardware name: KT400-8235
Modules linked in: tun nls_utf8 cifs pppoe pppox ppp_generic slhc iptable_mangle xt_TCPMSS xt_recent ipt_REJECT xt_tcpudp xt_state iptable_filter ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4 ip_tables x_tables sg dm_mod sd_mod
Pid: 3, comm: ksoftirqd/0 Tainted: G        W   2.6.36-08965-g2d3b07c-dirty #1
Call Trace:
 [<c10251a8>] ? warn_slowpath_common+0x78/0xb0
 [<c13ca3ea>] ? in_dev_finish_destroy+0x7a/0x80
 [<c13ca3ea>] ? in_dev_finish_destroy+0x7a/0x80
 [<c10251fb>] ? warn_slowpath_null+0x1b/0x20
 [<c13ca3ea>] ? in_dev_finish_destroy+0x7a/0x80
 [<c1383a30>] ? dst_destroy+0x80/0x100
 [<c1383a14>] ? dst_destroy+0x64/0x100
 [<c139c86f>] ? dst_rcu_free+0x1f/0x30
 [<c1063ff2>] ? __rcu_process_callbacks+0xe2/0x2b0
 [<c10641de>] ? rcu_process_callbacks+0x1e/0x30
 [<c102a5bc>] ? __do_softirq+0x6c/0xf0
 [<c102a550>] ? __do_softirq+0x0/0xf0
 <IRQ>  [<c102a1dd>] ? run_ksoftirqd+0x5d/0x130
 [<c102a180>] ? run_ksoftirqd+0x0/0x130
 [<c103c084>] ? kthread+0x74/0x80
 [<c103c010>] ? kthread+0x0/0x80
 [<c100313e>] ? kernel_thread_helper+0x6/0x18
---[ end trace 522231bc5fee959f ]---

Note You need to log in before you can comment on or make changes to this bug.