lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAJyhjX22Vna=TwuhD-FqyoXEd9D8wq_VdHbAAWwmqO1hZ34FRA@mail.gmail.com>
Date:	Tue, 22 May 2012 02:43:01 -0300
From:	Sergio Correia <lists@...e.net>
To:	netdev@...r.kernel.org
Subject: WARNING: at net/ipv4/tcp.c:1301 tcp_cleanup_rbuf+0x4f/0x110()

So far it has happened only once.
Last commit is 471368557a734c6c486ee757952c902b36e7fd01.


[ 3726.624387] ------------[ cut here ]------------
[ 3726.624398] WARNING: at net/ipv4/tcp.c:1301 tcp_cleanup_rbuf+0x4f/0x110()
[ 3726.624400] Hardware name: N53SV
[ 3726.624402] cleanup rbuf bug: copied A4D1F126 seq A4D1F126 rcvnxt A4D1F126
[ 3726.624404] Modules linked in:
[ 3726.624407] Pid: 1416, comm: transmission-gt Not tainted 3.4.0-git+ #52
[ 3726.624409] Call Trace:
[ 3726.624415]  [<ffffffff81035eba>] warn_slowpath_common+0x7a/0xb0
[ 3726.624419]  [<ffffffff81035f91>] warn_slowpath_fmt+0x41/0x50
[ 3726.624507]  [<ffffffff81aa57a5>] ? sub_preempt_count+0x65/0xc0
[ 3726.624510]  [<ffffffff819101cf>] tcp_cleanup_rbuf+0x4f/0x110
[ 3726.624514]  [<ffffffff819112b7>] tcp_recvmsg+0x637/0xa60
[ 3726.624518]  [<ffffffff81849310>] ? release_sock+0xe0/0x110
[ 3726.624522]  [<ffffffff81934a34>] inet_recvmsg+0x94/0xc0
[ 3726.624534]  [<ffffffff81844792>] sock_aio_read.part.8+0x142/0x170
[ 3726.624537]  [<ffffffff818447c0>] ? sock_aio_read.part.8+0x170/0x170
[ 3726.624540]  [<ffffffff818447e1>] sock_aio_read+0x21/0x30
[ 3726.624544]  [<ffffffff81124b0a>] do_sync_readv_writev+0xca/0x110
[ 3726.624548]  [<ffffffff8140f582>] ? security_file_permission+0x92/0xb0
[ 3726.624552]  [<ffffffff8112425c>] ? rw_verify_area+0x5c/0xe0
[ 3726.624555]  [<ffffffff81124de6>] do_readv_writev+0xd6/0x1e0
[ 3726.624558]  [<ffffffff8184336b>] ? sock_do_ioctl+0x2b/0x70
[ 3726.624562]  [<ffffffff81135abf>] ? do_vfs_ioctl+0x8f/0x530
[ 3726.624566]  [<ffffffff8141278f>] ? file_has_perm+0x8f/0xa0
[ 3726.624569]  [<ffffffff81124f7d>] vfs_readv+0x2d/0x50
[ 3726.624572]  [<ffffffff81124fe5>] sys_readv+0x45/0xb0
[ 3726.624575]  [<ffffffff81aa9062>] system_call_fastpath+0x16/0x1b
[ 3726.624578] ---[ end trace 6dc5d813929e5e6f ]---

Download attachment "config" of type "application/octet-stream" (93541 bytes)

Download attachment "dmesg-full" of type "application/octet-stream" (69341 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ