lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 19 Mar 2012 09:10:51 +0100
From:	Stefan Priebe - Profihost AG <s.priebe@...fihost.ag>
To:	stable@...r.kernel.org
CC:	Linux Netdev List <netdev@...r.kernel.org>
Subject: 3.0.23 WARNING: at net/ipv4/tcp_input.c:3375 tcp_ack+0x1d62/0x2030()

Hi list,

today i've seen the following error / backtrace several times on a
machine running vanilla stable 3.0.23.

------------[ cut here ]------------
WARNING: at net/ipv4/tcp_input.c:3375 tcp_ack+0x1d62/0x2030()
Hardware name: empty
Modules linked in: xt_tcpudp ipt_REJECT iptable_filter ip_tables
x_tables k8temp ipv6 md_mod dm_snapshot dm_mod
Pid: 0, comm: swapper Tainted: G        W   2.6.40.23intel #1
Call Trace:
 [<c05de162>] ? tcp_ack+0x1d62/0x2030
 [<c013d56c>] warn_slowpath_common+0x6c/0xa0
 [<c05de162>] ? tcp_ack+0x1d62/0x2030
 [<c0605e20>] ? bictcp_undo_cwnd+0x20/0x20
 [<c013d5bd>] warn_slowpath_null+0x1d/0x20
 [<c05de162>] tcp_ack+0x1d62/0x2030
 [<c05daa09>] ? tcp_validate_incoming+0x269/0x330
 [<c05de6d6>] tcp_rcv_established+0x2a6/0x5a0
 [<c05e72d1>] tcp_v4_do_rcv+0xf1/0x250
 [<c05e7a7a>] tcp_v4_rcv+0x64a/0x7b0
 [<f874c0ab>] ? iptable_filter_hook+0x3b/0x74 [iptable_filter]
 [<c05c809f>] ip_local_deliver_finish+0xef/0x260
 [<c05c829f>] ip_local_deliver+0x8f/0xa0
 [<c05c7fb0>] ? ip_call_ra_chain+0x110/0x110
 [<c05c7973>] ip_rcv_finish+0x143/0x350
 [<c05c7e1d>] ip_rcv+0x29d/0x320
 [<c05e484e>] ? tcp4_gro_receive+0x4e/0xd0
 [<c05a74cc>] __netif_receive_skb+0x37c/0x3f0
 [<c05a8177>] netif_receive_skb+0x47/0x70
 [<c05a829f>] napi_skb_finish+0x3f/0x50
 [<c05a8f91>] napi_gro_receive+0x111/0x140
 [<c04e61e7>] e1000_receive_skb+0x47/0x60
 [<c04e7e56>] e1000_clean_rx_irq+0x1f6/0x370
 [<c04e69f3>] e1000_clean+0x63/0x2b0
 [<c05a874d>] net_rx_action+0xdd/0x230
 [<c0143369>] __do_softirq+0xa9/0x180
 [<c01432c0>] ? irq_enter+0x60/0x60
 [<c01432c0>] ? irq_enter+0x60/0x60
 <IRQ>  [<c01431bd>] ? irq_exit+0x6d/0x90
 [<c0104375>] ? do_IRQ+0x45/0xb0
 [<c01431bd>] ? irq_exit+0x6d/0x90
 [<c011bf09>] ? smp_apic_timer_interrupt+0x59/0x90
 [<c065e9b0>] ? common_interrupt+0x30/0x38
 [<c010aaee>] ? mwait_idle+0xee/0x100
 [<c0101ee6>] ? cpu_idle+0x96/0xb0
 [<c0638188>] ? rest_init+0x58/0x70
 [<c08a08a5>] ? start_kernel+0x344/0x3a7
 [<c08a0325>] ? kernel_init+0x13e/0x13e
 [<c08a0079>] ? i386_start_kernel+0x79/0xb5
---[ end trace b310ee8f88560c3c ]---

Stefan
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists