lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20240227110740.0f657fbe@hermes.local>
Date: Tue, 27 Feb 2024 11:07:40 -0800
From: Stephen Hemminger <stephen@...workplumber.org>
To: netdev@...r.kernel.org
Subject: Fw: [Bug 218536] New: divide error in tcp_rcv_space_adjust



Begin forwarded message:

Date: Tue, 27 Feb 2024 18:16:35 +0000
From: bugzilla-daemon@...nel.org
To: stephen@...workplumber.org
Subject: [Bug 218536] New: divide error in tcp_rcv_space_adjust


https://bugzilla.kernel.org/show_bug.cgi?id=218536

            Bug ID: 218536
           Summary: divide error in tcp_rcv_space_adjust
           Product: Networking
           Version: 2.5
          Hardware: All
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P3
         Component: Other
          Assignee: stephen@...workplumber.org
          Reporter: adam@...erski.pl
        Regression: No

Created attachment 305916
  --> https://bugzilla.kernel.org/attachment.cgi?id=305916&action=edit  
dmesg

Kernel: 6.7.6 from openSUSE Tumbleweed (but I noticed it happening earlier as
well, not sure since when)

Network card:
Bus 002 Device 005: ID 0b95:1790 ASIX Electronics Corp. AX88179 Gigabit
Ethernet

Reproducible: Happens maybe once a day or few days. Don't know how and why.

Symptoms: Firefox stops being able to make any network connections. I need to
kill it, because it's stuck even when closing. Everything else seems to be
working fine (including stuff like https://github.com/debauchee/barrier).

Call Trace:
 <TASK>
 ? die+0x36/0x90
 ? do_trap+0xda/0x100
 ? tcp_rcv_space_adjust+0xbe/0x160
 ? do_error_trap+0x6a/0x90
 ? tcp_rcv_space_adjust+0xbe/0x160
 ? exc_divide_error+0x38/0x50
 ? tcp_rcv_space_adjust+0xbe/0x160
 ? asm_exc_divide_error+0x1a/0x20
 ? tcp_rcv_space_adjust+0xbe/0x160
 ? tcp_rcv_space_adjust+0x1a/0x160
 tcp_recvmsg_locked+0x2c3/0x950
 tcp_recvmsg+0x73/0x1f0
 ? __pfx_pollwake+0x10/0x10
 inet_recvmsg+0x56/0x130
 ? security_socket_recvmsg+0x41/0x70
 sock_recvmsg+0xa6/0xd0
 __sys_recvfrom+0xaa/0x120
 ? switch_fpu_return+0x50/0xe0
 ? syscall_exit_to_user_mode+0x2b/0x40
 ? do_syscall_64+0x70/0xe0
 ? do_syscall_64+0x70/0xe0
 ? syscall_exit_to_user_mode+0x2b/0x40
 __x64_sys_recvfrom+0x24/0x30
 do_syscall_64+0x61/0xe0
 entry_SYSCALL_64_after_hwframe+0x6e/0x76

-- 
You may reply to this email to add a comment.

You are receiving this mail because:
You are the assignee for the bug.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ