lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Tue, 17 Sep 2019 08:09:39 +0200
From:   Stephen Hemminger <stephen@...workplumber.org>
To:     netdev@...r.kernel.org
Subject: Fw: [Bug 204879] New: "invalid inflight", WARNING: CPU: 1 PID: 5103
 at net/ipv4/tcp_output.c:2509 tcp_send_loss_probe.cold.42+0x20/0x2d



Begin forwarded message:

Date: Mon, 16 Sep 2019 20:28:15 +0000
From: bugzilla-daemon@...zilla.kernel.org
To: stephen@...workplumber.org
Subject: [Bug 204879] New: "invalid inflight", WARNING: CPU: 1 PID: 5103 at net/ipv4/tcp_output.c:2509 tcp_send_loss_probe.cold.42+0x20/0x2d


https://bugzilla.kernel.org/show_bug.cgi?id=204879

            Bug ID: 204879
           Summary: "invalid inflight", WARNING: CPU: 1 PID: 5103 at
                    net/ipv4/tcp_output.c:2509
                    tcp_send_loss_probe.cold.42+0x20/0x2d
           Product: Networking
           Version: 2.5
    Kernel Version: 4.14.143
          Hardware: All
                OS: Linux
              Tree: Mainline
            Status: NEW
          Severity: normal
          Priority: P1
         Component: IPV4
          Assignee: stephen@...workplumber.org
          Reporter: rm+bko@...anrm.net
        Regression: No

After upgrading my kernel version from 4.14.121 to 4.14.143, on every boot I
now get the following warning.

Moreover, eventually (in a few hours) the server appears to lock-up. However I
can't say for sure if the lock-up is related, or what messages appear during
that time, as this is a remote system with no IPMI or the like. There's nothing
in disk-based logs. I'll try netconsole later if this continues to repeat.

For now, any ideas about this particular backtrace? Thanks

[   35.587989] invalid inflight: 1 state 1 cwnd 14 mss 1428
[   35.588004] ------------[ cut here ]------------
[   35.588009] WARNING: CPU: 1 PID: 5103 at net/ipv4/tcp_output.c:2509
tcp_send_loss_probe.cold.42+0x20/0x2d
[   35.588011] Modules linked in: wireguard ip6_udp_tunnel udp_tunnel
xt_comment xt_u32 xt_connlimit ip6t_MASQUERADE nf_nat_masquerade_ipv6 xt_TCPMSS
xt_nat xt_mark ipt_MASQUERADE nf_nat_masquerade_ipv4 xt_tcpudp xt_set
ip_set_hash_net ip_set nfnetlink xt_multiport xt_limit xt_length xt_conntrack
ip6t_rpfilter ipt_rpfilter ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6
nf_nat_ipv6 ip6table_raw ip6table_mangle iptable_nat nf_conntrack_ipv4
nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_raw iptable_mangle
ip6table_filter ip6_tables iptable_filter ip_tables x_tables
cpufreq_conservative cpufreq_powersave cpufreq_userspace tcp_bbr sch_fq
tcp_illinois intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp
kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc
aesni_intel
[   35.588042]  aes_x86_64 crypto_simd glue_helper cryptd snd_hda_codec_hdmi
intel_cstate snd_hda_codec_realtek snd_hda_codec_generic intel_uncore
snd_hda_intel i915 video iTCO_wdt intel_rapl_perf iTCO_vendor_support
snd_hda_codec drm_kms_helper evdev snd_hda_core pcspkr snd_hwdep snd_pcm
snd_timer pcc_cpufreq mei_me mei drm sg snd shpchp lpc_ich button i2c_algo_bit
serio_raw mfd_core soundcore ext4 crc16 mbcache jbd2 fscrypto btrfs
zstd_decompress zstd_compress xxhash sata_nv dm_crypt raid456 async_raid6_recov
async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c crc32c_generic
raid0 raid1 md_mod dm_mirror dm_region_hash dm_log dm_mod ata_piix sd_mod
xhci_pci xhci_hcd crc32c_intel ahci libahci i2c_i801 ehci_pci libata psmouse
ehci_hcd scsi_mod e1000e ptp usbcore pps_core
[   35.588086] CPU: 1 PID: 5103 Comm: xmrig Not tainted 4.14.144-rm1+ #64
[   35.588088] Hardware name:  /DH67BL, BIOS BLH6710H.86A.0160.2012.1204.1156
12/04/2012
[   35.588090] task: ffff8e0c0578bb80 task.stack: ffffa6a349524000
[   35.588093] RIP: 0010:tcp_send_loss_probe.cold.42+0x20/0x2d
[   35.588095] RSP: 0000:ffff8e0c1f283e70 EFLAGS: 00010246
[   35.588097] RAX: 000000000000002c RBX: ffff8e0c0b932a80 RCX:
0000000000000000
[   35.588099] RDX: 0000000000000000 RSI: ffff8e0c1f296738 RDI:
ffff8e0c1f296738
[   35.588101] RBP: ffff8e0c0b932bd8 R08: 0000000000000000 R09:
0000000000000275
[   35.588103] R10: ffff8e0c0e911280 R11: 0000000000000000 R12:
ffff8e0c0b932bd8
[   35.588105] R13: ffffffff827d46b0 R14: ffff8e0c0b932a80 R15:
ffff8e0c1f283ef0
[   35.588107] FS:  00007f71de376700(0000) GS:ffff8e0c1f280000(0000)
knlGS:0000000000000000
[   35.588110] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   35.588112] CR2: 000055f0f061c000 CR3: 0000000409d0e001 CR4:
00000000000606e0
[   35.588114] Call Trace:
[   35.588116]  <IRQ>
[   35.588120]  tcp_write_timer_handler+0xce/0x210
[   35.588123]  tcp_write_timer+0x77/0x90
[   35.588126]  call_timer_fn+0x30/0x130
[   35.588129]  run_timer_softirq+0x3d3/0x410
[   35.588133]  ? timerqueue_add+0x52/0x80
[   35.588136]  ? enqueue_hrtimer+0x36/0x80
[   35.588140]  __do_softirq+0xdb/0x2d5
[   35.588142]  ? hrtimer_interrupt+0x113/0x1d0
[   35.588147]  irq_exit+0xbc/0xd0
[   35.588150]  smp_apic_timer_interrupt+0x78/0x140
[   35.588152]  apic_timer_interrupt+0x85/0x90
[   35.588154]  </IRQ>
[   35.588156] RIP: 0033:0x7f71ddb3b16f
[   35.588158] RSP: 002b:81244f1f4aebe662 EFLAGS: 00000206 ORIG_RAX:
ffffffffffffff10
[   35.588161] RAX: 000000005590220e RBX: 000000004520e100 RCX:
00007f71dd513600
[   35.588163] RDX: 000000005476b198 RSI: 8219664b28bc2fe0 RDI:
00000000555b6ee0
[   35.588165] RBP: 0000000092e54880 R08: 000000000007be43 R09:
00000000ce690f4f
[   35.588166] R10: 00000000001f6970 R11: 00007f71dd400000 R12:
80ee3d8c155f6970
[   35.588168] R13: 4b3017ab1f4489c9 R14: 3854bb60406a6bea R15:
eb98349c9e84f39a
[   35.588171] Code: 00 c6 83 7b 04 00 00 00 5b 5d c3 0f b6 53 12 8b 8b 2c 06
00 00 41 89 c0 48 c7 c7 90 e3 06 83 c6 05 39 64 b1 00 01 e8 cd a3 b0 ff <0f> 0b
e9 1f ee ff ff 90 90 90 90 90 90 66 66 66 66 90 48 8b 47 
[   35.588193] ---[ end trace 7c7f3665018c9e60 ]---

-- 
You are receiving this mail because:
You are the assignee for the bug.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ