Message ID | 20150717110111.16718.77665.stgit@buzz |
---|---|
State | Accepted, archived |
Delegated to: | David Miller |
Headers | show |
From: Konstantin Khlebnikov <khlebnikov@yandex-team.ru> Date: Fri, 17 Jul 2015 14:01:11 +0300 > Kernel generates a lot of warnings when dst entry reference counter > overflows and becomes negative. That bug was seen several times at > machines with outdated 3.10.y kernels. Most like it's already fixed > in upstream. Anyway that flood completely kills machine and makes > further debugging impossible. > > Signed-off-by: Konstantin Khlebnikov <khlebnikov@yandex-team.ru> Applied. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
diff --git a/net/core/dst.c b/net/core/dst.c index e956ce6d1378..002144bea935 100644 --- a/net/core/dst.c +++ b/net/core/dst.c @@ -284,7 +284,9 @@ void dst_release(struct dst_entry *dst) int newrefcnt; newrefcnt = atomic_dec_return(&dst->__refcnt); - WARN_ON(newrefcnt < 0); + if (unlikely(newrefcnt < 0)) + net_warn_ratelimited("%s: dst:%p refcnt:%d\n", + __func__, dst, newrefcnt); if (unlikely(dst->flags & DST_NOCACHE) && !newrefcnt) call_rcu(&dst->rcu_head, dst_destroy_rcu); }
Kernel generates a lot of warnings when dst entry reference counter overflows and becomes negative. That bug was seen several times at machines with outdated 3.10.y kernels. Most like it's already fixed in upstream. Anyway that flood completely kills machine and makes further debugging impossible. Signed-off-by: Konstantin Khlebnikov <khlebnikov@yandex-team.ru> --- net/core/dst.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html