lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 9 Oct 2017 11:07:11 -0700
From:   Andrei Vagin <avagin@...il.com>
To:     Linux Kernel Network Developers <netdev@...r.kernel.org>
Subject: net-next: WARNING: CPU: 0 PID: 1544 at net/ipv4/tcp_input.c:889

Hello,

We run CRIU tests on a daily basis for net-next and today they
triggered a following warning:


[   58.827039] ------------[ cut here ]------------
[   58.827078] WARNING: CPU: 0 PID: 1544 at net/ipv4/tcp_input.c:889
tcp_update_reordering+0x9f/0xb0
[   58.827083] Modules linked in:
[   58.827095] CPU: 0 PID: 1544 Comm: sshd Not tainted 4.14.0-rc3+ #1
[   58.827101] Hardware name: Google Google Compute Engine/Google
Compute Engine, BIOS Google 01/01/2011
[   58.827106] task: ffff90f2633dcc80 task.stack: ffffb0e302800000
[   58.827112] RIP: 0010:tcp_update_reordering+0x9f/0xb0
[   58.827117] RSP: 0018:ffffb0e302803b28 EFLAGS: 00010282
[   58.827126] RAX: 00000000fffffffd RBX: ffff90f29136e840 RCX: 0000000000000003
[   58.827131] RDX: 0000000000000000 RSI: 00000000fffffffd RDI: ffff90f29136de80
[   58.827136] RBP: ffffb0e302803b28 R08: 0000000000000044 R09: 00000000e59da6c6
[   58.827142] R10: ffffb0e302803b68 R11: 00000000e59da70a R12: 00000000e59da6c6
[   58.827147] R13: ffff90f29136e848 R14: ffff90f29136de80 R15: 0000000000000002
[   58.827153] FS:  00007f52e8452840(0000) GS:ffff90f29fc00000(0000)
knlGS:0000000000000000
[   58.827158] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   58.827163] CR2: 000014727db10a10 CR3: 00000001d0967000 CR4: 00000000001406f0
[   58.827172] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   58.827177] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   58.827182] Call Trace:
[   58.827191]  tcp_sacktag_write_queue+0x54d/0x860
[   58.827206]  tcp_ack+0xa71/0x1360
[   58.827229]  tcp_rcv_established+0x1da/0x560
[   58.827241]  tcp_v4_do_rcv+0x139/0x1d0
[   58.827251]  __release_sock+0x6d/0x110
[   58.827260]  release_sock+0x30/0xb0
[   58.827267]  tcp_sendmsg+0x37/0x50
[   58.827276]  inet_sendmsg+0x45/0x1e0
[   58.827287]  sock_sendmsg+0x38/0x50
[   58.827295]  sock_write_iter+0x7e/0xd0
[   58.827311]  __vfs_write+0xd4/0x150
[   58.827325]  vfs_write+0xcd/0x1d0
[   58.827332]  ? trace_hardirqs_on_caller+0x11f/0x190
[   58.827341]  SyS_write+0x49/0xa0
[   58.827353]  entry_SYSCALL_64_fastpath+0x23/0xc2
[   58.827360] RIP: 0033:0x7f52e6186710
[   58.827365] RSP: 002b:00007fffd37723b8 EFLAGS: 00000246 ORIG_RAX:
0000000000000001
[   58.827375] RAX: ffffffffffffffda RBX: 000000002e3e9273 RCX: 00007f52e6186710
[   58.827380] RDX: 0000000000000044 RSI: 0000557474a3e160 RDI: 0000000000000003
[   58.827385] RBP: 00007f52e7237240 R08: 0000000000000006 R09: 0000000000000001
[   58.827390] R10: 0000000000004da8 R11: 0000000000000246 R12: 000000005bb2be1e
[   58.827396] R13: 00000000e9218d7d R14: 0000000059b77fb7 R15: 00000000505bdd2c
[   58.827414] Code: b8 1d 00 00 00 c0 ea 04 84 d2 74 0b 89 d0 c1 e0
1e c1 f8 1f 83 c0 1c 48 8b 57 30 48 98 48 8b 92 00 02 00 00 65 48 ff
04 c2 5d c3 <0f> ff 5d c3 0f 1f 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f
44 00
[   58.827724] ---[ end trace b8d78168bbc71c1f ]---

Here is a fill log:
https://travis-ci.org/avagin/linux/jobs/285457708

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ