This problem was not reported previously. Looks like ss hitting bug in raw_diag.c
Begin forwarded message: Date: Sun, 13 Jan 2019 09:52:12 +0000 From: bugzilla-dae...@bugzilla.kernel.org To: step...@networkplumber.org Subject: [Bug 202249] New: WARNING: CPU: 1 PID: 3904 at net/ipv4/raw_diag.c:28 raw_get_hashinfo.isra.0+0x1a/0x30 https://bugzilla.kernel.org/show_bug.cgi?id=202249 Bug ID: 202249 Summary: WARNING: CPU: 1 PID: 3904 at net/ipv4/raw_diag.c:28 raw_get_hashinfo.isra.0+0x1a/0x30 Product: Networking Version: 2.5 Kernel Version: 4.20.2 Hardware: Intel OS: Linux Tree: Mainline Status: NEW Severity: high Priority: P1 Component: IPV4 Assignee: step...@networkplumber.org Reporter: micro...@gmail.com Regression: No Machine boot 5 min after that : [ 173.180430] raw_diag: Unexpected inet family 10 [ 173.181035] WARNING: CPU: 1 PID: 3904 at net/ipv4/raw_diag.c:28 raw_get_hashinfo.isra.0+0x1a/0x30 [raw_diag] [ 173.181936] Modules linked in: raw_diag unix_diag af_packet_diag sch_hfsc iptable_filter iptable_mangle xt_addrtype xt_nat iptable_nat nf_nat_ipv4 ip_tables bpfilter sch_fq_codel netconsole ifb tg3 libphy e1000e e1000 igb i2c_algo_bit ixgbe mdio ixgb nf_nat_pptp nf_nat_proto_gre nf_conntrack_pptp nf_conntrack_proto_gre nf_nat_tftp nf_conntrack_tftp nf_nat_ftp nf_conntrack_ftp nf_nat nf_conntrack nf_defrag_ipv4 pppoe pptp gre pppox sha1_ssse3 sha1_generic arc4 ppp_mppe ppp_generic slhc tun [ 173.185512] CPU: 1 PID: 3904 Comm: ss Tainted: G O 4.20.1 #1 [ 173.185997] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)/Standard PC (i440FX + PIIX, 1996), BIOS [ 173.186955] RIP: 0010:raw_get_hashinfo.isra.0+0x1a/0x30 [raw_diag] [ 173.187477] Code: e8 01 89 46 3c c3 66 2e 0f 1f 84 00 00 00 00 00 48 c7 c0 60 92 2b 82 40 80 ff 02 74 16 80 3d d8 1f 00 00 00 0f 84 d3 03 00 00 <0f> 0b 48 c7 c0 ea ff ff ff c3 66 66 2e 0f 1f 84 00 00 00 00 00 90 [ 173.189058] RSP: 0018:ffffc9000314fa88 EFLAGS: 00010246 [ 173.189576] RAX: 0000000000000023 RBX: ffffffffa02680c0 RCX: ffffffff81e2ca38 [ 173.190131] RDX: 0000000000000000 RSI: 0000000000000082 RDI: ffffffff82212fe4 [ 173.190683] RBP: ffff8880a2e32e10 R08: 00000000000001f7 R09: 0000000000000000 [ 173.191228] R10: 0000000000000000 R11: ffff8880a0c92000 R12: ffff8880a39d0af0 [ 173.191765] R13: ffff8880a39d0af0 R14: 0000000000000000 R15: 0000000000000001 [ 173.192306] FS: 00007fa50cf6c540(0000) GS:ffff8880a5c80000(0000) knlGS:0000000000000000 [ 173.193366] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 173.193926] CR2: 000000000042af28 CR3: 000000005e160000 CR4: 00000000000006e0 [ 173.194494] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 173.195075] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 173.195632] Call Trace: [ 173.196212] raw_diag_dump+0x37/0x1b0 [raw_diag] [ 173.196773] ? __kmalloc_reserve.isra.9+0x24/0x70 [ 173.197325] __inet_diag_dump+0x36/0x80 [ 173.197881] netlink_dump+0x16d/0x360 [ 173.198423] __netlink_dump_start+0x13e/0x1a0 [ 173.198942] inet_diag_handler_cmd+0xb2/0xc0 [ 173.199455] ? inet_diag_dump_compat+0xe0/0xe0 [ 173.199943] sock_diag_rcv_msg+0x106/0x130 [ 173.200428] ? sock_diag_bind+0x50/0x50 [ 173.200892] netlink_rcv_skb+0x44/0x120 [ 173.201354] sock_diag_rcv+0x1f/0x30 [ 173.201800] netlink_unicast+0x188/0x250 [ 173.202230] netlink_sendmsg+0x1c0/0x3e0 [ 173.202646] sock_sendmsg+0xb/0x20 [ 173.203066] ___sys_sendmsg+0x238/0x260 [ 173.203502] ? filemap_map_pages+0x13c/0x310 [ 173.203769] ? page_add_new_anon_rmap+0x6a/0xa0 [ 173.204027] ? __handle_mm_fault+0xa6a/0x1340 [ 173.204272] __sys_sendmsg+0x4c/0x90 [ 173.204540] do_syscall_64+0x79/0x210 [ 173.204788] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 173.205097] RIP: 0033:0x7fa50cea7404 [ 173.205367] Code: 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b5 0f 1f 80 00 00 00 00 48 8d 05 f9 32 0c 00 8b 00 85 c0 75 13 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 c3 0f 1f 00 41 54 41 89 d4 55 48 89 f5 53 [ 173.206035] RSP: 002b:00007fff12231d48 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 173.206495] RAX: ffffffffffffffda RBX: 00007fff12231ea0 RCX: 00007fa50cea7404 [ 173.206764] RDX: 0000000000000000 RSI: 00007fff12231ef0 RDI: 0000000000000003 [ 173.207028] RBP: 000000000000000a R08: 0000000000000000 R09: 0000000000000010 [ 173.207286] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003 [ 173.207546] R13: 00007fff12231ef0 R14: 00007fff12231e60 R15: 00000000000000ff [ 173.207806] ---[ end trace b5d8d4a1f2d2b8ae ]--- -- You are receiving this mail because: You are the assignee for the bug.