From mboxrd@z Thu Jan 1 00:00:00 1970 From: John Dykstra Subject: Re: WARNING: at net/ipv4/af_inet.c:155 inet_sock_destruct+0x122/0x13a() Date: Tue, 04 Aug 2009 20:04:57 +0000 Message-ID: <1249416297.7174.10.camel@Maple> References: <4A76A009.40605@wpkg.org> Mime-Version: 1.0 Content-Type: text/plain Content-Transfer-Encoding: 7bit Cc: netdev@vger.kernel.org To: Tomasz Chmielewski Return-path: Received: from mail-pz0-f179.google.com ([209.85.222.179]:53605 "EHLO mail-pz0-f179.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752470AbZHDUF5 (ORCPT ); Tue, 4 Aug 2009 16:05:57 -0400 Received: by pzk9 with SMTP id 9so3372282pzk.21 for ; Tue, 04 Aug 2009 13:05:45 -0700 (PDT) In-Reply-To: <4A76A009.40605@wpkg.org> Sender: netdev-owner@vger.kernel.org List-ID: On Mon, 2009-08-03 at 10:30 +0200, Tomasz Chmielewski wrote: > After upgrading from 2.6.29.1 to 2.6.30.4, I'm getting these warnings in dmesg. > > Let me know if you need more info. > > Other than that, the device seems to work stable. > > ------------[ cut here ]------------ > WARNING: at net/ipv4/af_inet.c:155 inet_sock_destruct+0x122/0x13a() > Hardware name: Altos G510 > Modules linked in: nfs nfsd lockd nfs_acl auth_rpcgss sunrpc exportfs tun bitrev crc32 bonding lm75 adm9240 adm1026 hwmon_vid hwmon i2c_piix4 i2c_core dm_crypt dm_mirror dm_region_hash dm_log dm_snapshot dm_mod e1000 tg3 libphy > Pid: 2222, comm: openvpn Not tainted 2.6.30.4-1 #4 > Call Trace: > [<4011f018>] ? warn_slowpath_common+0x5e/0x8a > [<4011f04e>] ? warn_slowpath_null+0xa/0xc > [<402b5d64>] ? inet_sock_destruct+0x122/0x13a > [<402796a4>] ? sk_free+0x10/0xa7 > [<402b5964>] ? inet_release+0x3f/0x44 > [<4027751b>] ? sock_release+0x11/0x52 > [<40277575>] ? sock_close+0x19/0x1c > [<40164026>] ? __fput+0xa6/0x149 > [<40161989>] ? filp_close+0x4e/0x54 > [<401619f5>] ? sys_close+0x66/0x9c > [<401027c8>] ? sysenter_do_call+0x12/0x26 > ---[ end trace bdfe445acbab5307 ]--- > ------------[ cut here ]------------ > WARNING: at net/ipv4/af_inet.c:155 inet_sock_destruct+0x122/0x13a() > Hardware name: Altos G510 > Modules linked in: nfs nfsd lockd nfs_acl auth_rpcgss sunrpc exportfs tun bitrev crc32 bonding lm75 adm9240 adm1026 hwmon_vid hwmon i2c_piix4 i2c_core dm_crypt dm_mirror dm_region_hash dm_log dm_snapshot dm_mod e1000 tg3 libphy > Pid: 2222, comm: openvpn Tainted: G W 2.6.30.4-1 #4 > Call Trace: > [<4011f018>] ? warn_slowpath_common+0x5e/0x8a > [<4011f04e>] ? warn_slowpath_null+0xa/0xc > [<402b5d64>] ? inet_sock_destruct+0x122/0x13a > [<402796a4>] ? sk_free+0x10/0xa7 > [<402b5964>] ? inet_release+0x3f/0x44 > [<4027751b>] ? sock_release+0x11/0x52 > [<40277575>] ? sock_close+0x19/0x1c > [<40164026>] ? __fput+0xa6/0x149 > [<40161989>] ? filp_close+0x4e/0x54 > [<401619f5>] ? sys_close+0x66/0x9c > [<401027c8>] ? sysenter_do_call+0x12/0x26 > ---[ end trace bdfe445acbab5308 ]--- > ------------[ cut here ]------------ > WARNING: at net/ipv4/af_inet.c:155 inet_sock_destruct+0x122/0x13a() > Hardware name: Altos G510 > Modules linked in: nfs nfsd lockd nfs_acl auth_rpcgss sunrpc exportfs tun bitrev crc32 bonding lm75 adm9240 adm1026 hwmon_vid hwmon i2c_piix4 i2c_core dm_crypt dm_mirror dm_region_hash dm_log dm_snapshot dm_mod e1000 tg3 libphy > Pid: 2222, comm: openvpn Tainted: G W 2.6.30.4-1 #4 > Call Trace: > [<4011f018>] ? warn_slowpath_common+0x5e/0x8a > [<4011f04e>] ? warn_slowpath_null+0xa/0xc > [<402b5d64>] ? inet_sock_destruct+0x122/0x13a > [<402796a4>] ? sk_free+0x10/0xa7 > [<402b5964>] ? inet_release+0x3f/0x44 > [<4027751b>] ? sock_release+0x11/0x52 > [<40277575>] ? sock_close+0x19/0x1c > [<40164026>] ? __fput+0xa6/0x149 > [<40161989>] ? filp_close+0x4e/0x54 > [<401619f5>] ? sys_close+0x66/0x9c > [<401027c8>] ? sysenter_do_call+0x12/0x26 > ---[ end trace bdfe445acbab5309 ]--- Is this an openvpn server or client? Does the warning fire on each authentication, or while the tunnel is up? Are you tunneling over UDP or TCP? Your kernel config, network configuration details and openvpn configuration might be useful. Thanks! -- John