lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Sun, 18 Mar 2012 18:44:39 -0700 (PDT)
From:	Stephen Hemminger <stephen.hemminger@...tta.com>
To:	netdev@...r.kernel.org
Subject: Fwd: [Bug 42957] New: Kernel trap probably by malicious packet from torrent peer



----- Forwarded Message -----
> https://bugzilla.kernel.org/show_bug.cgi?id=42957
> 
>            Summary: Kernel trap probably by malicious packet from
>            torrent
>                     peer
>            Product: Networking
>            Version: 2.5
>     Kernel Version: 3.0.23
>           Platform: All
>         OS/Version: Linux
>               Tree: Mainline
>             Status: NEW
>           Severity: normal
>           Priority: P1
>          Component: IPV4
>         AssignedTo: shemminger@...ux-foundation.org
>         ReportedBy: warpme@...pl
>         Regression: No
> 
> 
> Hi,
> 
> Last day I got 2 traps on otherwise (months of 24/7 uptime) stable
> server. I
> see correlation with launching torrent download (transmission
> client). Sys is
> 64-bit ArchLinux with 3.0.23 kernel. Log from trap is below. I submit
> this in
> IPv4 - but I'll appreciate if somebody will deduce from trap log
> proper
> category/kernel component involved/responsible this issue.
> 
> ------------[ cut here ]------------
> Mar 17 19:32:47 [98071.093459] WARNING: at net/ipv4/tcp_input.c:2999
> tcp_ack+0x1e34/0x2080()
> Mar 17 19:32:47 [98071.093461] Hardware name: GA-880GA-UD3H
> Mar 17 19:32:47 [98071.093462] Modules linked in: md5 dvbloopback
> nfsd exportfs
> nfs nfs_acl lockd auth_rpcgss fscache sunrpc xt_multiport xt_recent
> xt_state
> xt_tcpudp dvb_pll cx22702 stb6100 stv090x cx88_dvb videobuf_dvb
> cx88_vp3054_i2c
> dvb_core iptable_mangle rc_hauppauge iptable_nat nf_nat
> nf_conntrack_ipv4
> nf_defrag_ipv4 nf_conntrack iptable_filter ip_tables x_tables
> rc_tbs_nec
> appletalk ipx p8023 psnap p8022 llc snd_hda_codec_hdmi tuner cx8802
> cx8800
> cx88xx tveeprom btcx_risc videobuf_dma_sg videobuf_core v4l2_common
> videodev
> snd_hda_intel snd_hda_codec snd_hwdep snd_pcm snd_page_alloc
> snd_timer snd
> radeon soundcore drm_kms_helper ttm drm ir_lirc_codec lirc_dev
> i2c_algo_bit
> ir_sony_decoder ir_jvc_decoder ir_rc6_decoder i2c_piix4 shpchp wmi
> pci_hotplug
> i2c_core ftdi_sio usbserial edac_mce_amd v4l2_compat_ioctl32
> ir_rc5_decoder
> media ir_nec_decoder rc_core sp5100_tco edac_core processor e1000e
> button r8169
> mii pcspkr evdev k10temp loop it87 hwmon_vid ipv6 autofs4 ext3
> mbcache jbd
> sd_mod pata_jmi
> Mar 17 19:32:47 cron pata_acpi ata_generic ahci libahci libata
> scsi_mod
> ohci_hcd ehci_hcd xhci_hcd usbcore
> Mar 17 19:32:47 [98071.093507] Pid: 0, comm: kworker/0:0 Tainted: G
>        W
> 3.0-ARCH #1
> Mar 17 19:32:47 [98071.093508] Call Trace:
> Mar 17 19:32:47 [98071.093509]  <IRQ>  [<ffffffff8105c8ff>]
> warn_slowpath_common+0x7f/0xc0
> Mar 17 19:32:47 [98071.093514]  [<ffffffff8105c95a>]
> warn_slowpath_null+0x1a/0x20
> Mar 17 19:32:47 [98071.093517]  [<ffffffff81380c74>]
> tcp_ack+0x1e34/0x2080
> Mar 17 19:32:47 [98071.093520]  [<ffffffffa026a1b7>] ?
> ipt_do_table+0x227/0x5b0
> [ip_tables]
> Mar 17 19:32:47 [98071.093523]  [<ffffffff81381d50>]
> tcp_rcv_established+0x280/0x830
> Mar 17 19:32:47 [98071.093525]  [<ffffffff81388d6f>]
> tcp_v4_do_rcv+0x10f/0x310
> Mar 17 19:32:47 [98071.093544]  [<ffffffff81348545>] ?
> sk_filter+0x95/0xd0
> Mar 17 19:32:47 [98071.093546]  [<ffffffff8138ae14>]
> tcp_v4_rcv+0x624/0x910
> Mar 17 19:32:47 [98071.093549]  [<ffffffff8136804d>]
> ip_local_deliver_finish+0xed/0x2b0
> Mar 17 19:32:47 [98071.093551]  [<ffffffff813683e0>]
> ip_local_deliver+0x90/0xa0
> Mar 17 19:32:47 [98071.093553]  [<ffffffff81367d21>]
> ip_rcv_finish+0x131/0x370
> Mar 17 19:32:47 [98071.093556]  [<ffffffff81368615>]
> ip_rcv+0x225/0x2f0
> Mar 17 19:32:47 [98071.093559]  [<ffffffff81334c1a>]
> __netif_receive_skb+0x30a/0x660
> Mar 17 19:32:47 [98071.093561]  [<ffffffff8133574d>]
> netif_receive_skb+0xad/0xc0
> Mar 17 19:32:47 [98071.093564]  [<ffffffff81336140>]
> napi_skb_finish+0x50/0x70
> Mar 17 19:32:47 [98071.093567]  [<ffffffff81336255>]
> napi_gro_receive+0xf5/0x140
> Mar 17 19:32:47 [98071.093572]  [<ffffffffa01c6dbb>]
> e1000_receive_skb+0x5b/0x70 [e1000e]
> Mar 17 19:32:47 [98071.093578]  [<ffffffffa01c8702>]
> e1000_clean_rx_irq+0x2c2/0x430 [e1000e]
> Mar 17 19:32:47 [98071.093581]  [<ffffffff8108404f>] ?
> hrtimer_interrupt+0x12f/0x210
> Mar 17 19:32:47 [98071.093586]  [<ffffffffa01c811f>]
> e1000_clean+0xaf/0x2b0
> [e1000e]
> Mar 17 19:32:47 [98071.093589]  [<ffffffff81335a29>]
> net_rx_action+0x149/0x300
> Mar 17 19:32:47 [98071.093592]  [<ffffffff81063f90>]
> __do_softirq+0xb0/0x270
> Mar 17 19:32:47 [98071.093594]  [<ffffffff813f875c>]
> call_softirq+0x1c/0x30
> Mar 17 19:32:47 [98071.093596]  [<ffffffff8100db25>]
> do_softirq+0x65/0xa0
> Mar 17 19:32:47 [98071.093598]  [<ffffffff8106449e>]
> irq_exit+0x9e/0xc0
> Mar 17 19:32:47 [98071.093600]  [<ffffffff813f8fb3>] do_IRQ+0x63/0xe0
> Mar 17 19:32:47 [98071.093603]  [<ffffffff813f6c93>]
> common_interrupt+0x13/0x13
> Mar 17 19:32:47 [98071.093604]  <EOI>  [<ffffffff81031e9b>] ?
> native_safe_halt+0xb/0x10
> Mar 17 19:32:47 [98071.093609]  [<ffffffff81014173>]
> default_idle+0x53/0x2a0
> Mar 17 19:32:47 [98071.093611]  [<ffffffff8101499a>]
> amd_e400_idle+0x9a/0x120
> Mar 17 19:32:47 [98071.093614]  [<ffffffff8100a21a>]
> cpu_idle+0xba/0x100
> Mar 17 19:32:47 [98071.093616]  [<ffffffff813e6169>]
> start_secondary+0x202/0x209
> Mar 17 19:32:47 [98071.093618] ---[ end trace 4fecd84b3e9e66ee ]---
> Mar 17 19:32:47 [98071.274828] ------------[ cut here ]------------
> 
> --
> Configure bugmail:
> https://bugzilla.kernel.org/userprefs.cgi?tab=email
> ------- You are receiving this mail because: -------
> You are the assignee for the bug.
> 
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ