Bug 42957 - Kernel trap probably by malicious packet from torrent peer
Summary: Kernel trap probably by malicious packet from torrent peer
Status: CLOSED CODE_FIX
Alias: None
Product: Networking
Classification: Unclassified
Component: IPV4 (show other bugs)
Hardware: All Linux
: P1 normal
Assignee: Stephen Hemminger
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2012-03-18 19:28 UTC by warpme
Modified: 2020-09-24 18:55 UTC (History)
3 users (show)

See Also:
Kernel Version: 3.0.23
Subsystem:
Regression: No
Bisected commit-id:


Attachments

Description warpme 2012-03-18 19:28:23 UTC
Hi,

Last day I got 2 traps on otherwise (months of 24/7 uptime) stable server. I see correlation with launching torrent download (transmission client). Sys is 64-bit ArchLinux with 3.0.23 kernel. Log from trap is below. I submit this in IPv4 - but I'll appreciate if somebody will deduce from trap log proper category/kernel component involved/responsible this issue.  

------------[ cut here ]------------
Mar 17 19:32:47 [98071.093459] WARNING: at net/ipv4/tcp_input.c:2999 tcp_ack+0x1e34/0x2080()
Mar 17 19:32:47 [98071.093461] Hardware name: GA-880GA-UD3H
Mar 17 19:32:47 [98071.093462] Modules linked in: md5 dvbloopback nfsd exportfs nfs nfs_acl lockd auth_rpcgss fscache sunrpc xt_multiport xt_recent xt_state xt_tcpudp dvb_pll cx22702 stb6100 stv090x cx88_dvb videobuf_dvb cx88_vp3054_i2c dvb_core iptable_mangle rc_hauppauge iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_conntrack iptable_filter ip_tables x_tables rc_tbs_nec appletalk ipx p8023 psnap p8022 llc snd_hda_codec_hdmi tuner cx8802 cx8800 cx88xx tveeprom btcx_risc videobuf_dma_sg videobuf_core v4l2_common videodev snd_hda_intel snd_hda_codec snd_hwdep snd_pcm snd_page_alloc snd_timer snd radeon soundcore drm_kms_helper ttm drm ir_lirc_codec lirc_dev i2c_algo_bit ir_sony_decoder ir_jvc_decoder ir_rc6_decoder i2c_piix4 shpchp wmi pci_hotplug i2c_core ftdi_sio usbserial edac_mce_amd v4l2_compat_ioctl32 ir_rc5_decoder media ir_nec_decoder rc_core sp5100_tco edac_core processor e1000e button r8169 mii pcspkr evdev k10temp loop it87 hwmon_vid ipv6 autofs4 ext3 mbcache jbd sd_mod pata_jmi
Mar 17 19:32:47 cron pata_acpi ata_generic ahci libahci libata scsi_mod ohci_hcd ehci_hcd xhci_hcd usbcore
Mar 17 19:32:47 [98071.093507] Pid: 0, comm: kworker/0:0 Tainted: G        W   3.0-ARCH #1
Mar 17 19:32:47 [98071.093508] Call Trace:
Mar 17 19:32:47 [98071.093509]  <IRQ>  [<ffffffff8105c8ff>] warn_slowpath_common+0x7f/0xc0
Mar 17 19:32:47 [98071.093514]  [<ffffffff8105c95a>] warn_slowpath_null+0x1a/0x20
Mar 17 19:32:47 [98071.093517]  [<ffffffff81380c74>] tcp_ack+0x1e34/0x2080
Mar 17 19:32:47 [98071.093520]  [<ffffffffa026a1b7>] ? ipt_do_table+0x227/0x5b0 [ip_tables]
Mar 17 19:32:47 [98071.093523]  [<ffffffff81381d50>] tcp_rcv_established+0x280/0x830
Mar 17 19:32:47 [98071.093525]  [<ffffffff81388d6f>] tcp_v4_do_rcv+0x10f/0x310
Mar 17 19:32:47 [98071.093544]  [<ffffffff81348545>] ? sk_filter+0x95/0xd0
Mar 17 19:32:47 [98071.093546]  [<ffffffff8138ae14>] tcp_v4_rcv+0x624/0x910
Mar 17 19:32:47 [98071.093549]  [<ffffffff8136804d>] ip_local_deliver_finish+0xed/0x2b0
Mar 17 19:32:47 [98071.093551]  [<ffffffff813683e0>] ip_local_deliver+0x90/0xa0
Mar 17 19:32:47 [98071.093553]  [<ffffffff81367d21>] ip_rcv_finish+0x131/0x370
Mar 17 19:32:47 [98071.093556]  [<ffffffff81368615>] ip_rcv+0x225/0x2f0
Mar 17 19:32:47 [98071.093559]  [<ffffffff81334c1a>] __netif_receive_skb+0x30a/0x660
Mar 17 19:32:47 [98071.093561]  [<ffffffff8133574d>] netif_receive_skb+0xad/0xc0
Mar 17 19:32:47 [98071.093564]  [<ffffffff81336140>] napi_skb_finish+0x50/0x70
Mar 17 19:32:47 [98071.093567]  [<ffffffff81336255>] napi_gro_receive+0xf5/0x140
Mar 17 19:32:47 [98071.093572]  [<ffffffffa01c6dbb>] e1000_receive_skb+0x5b/0x70 [e1000e]
Mar 17 19:32:47 [98071.093578]  [<ffffffffa01c8702>] e1000_clean_rx_irq+0x2c2/0x430 [e1000e]
Mar 17 19:32:47 [98071.093581]  [<ffffffff8108404f>] ? hrtimer_interrupt+0x12f/0x210
Mar 17 19:32:47 [98071.093586]  [<ffffffffa01c811f>] e1000_clean+0xaf/0x2b0 [e1000e]
Mar 17 19:32:47 [98071.093589]  [<ffffffff81335a29>] net_rx_action+0x149/0x300
Mar 17 19:32:47 [98071.093592]  [<ffffffff81063f90>] __do_softirq+0xb0/0x270
Mar 17 19:32:47 [98071.093594]  [<ffffffff813f875c>] call_softirq+0x1c/0x30
Mar 17 19:32:47 [98071.093596]  [<ffffffff8100db25>] do_softirq+0x65/0xa0
Mar 17 19:32:47 [98071.093598]  [<ffffffff8106449e>] irq_exit+0x9e/0xc0
Mar 17 19:32:47 [98071.093600]  [<ffffffff813f8fb3>] do_IRQ+0x63/0xe0
Mar 17 19:32:47 [98071.093603]  [<ffffffff813f6c93>] common_interrupt+0x13/0x13
Mar 17 19:32:47 [98071.093604]  <EOI>  [<ffffffff81031e9b>] ? native_safe_halt+0xb/0x10
Mar 17 19:32:47 [98071.093609]  [<ffffffff81014173>] default_idle+0x53/0x2a0
Mar 17 19:32:47 [98071.093611]  [<ffffffff8101499a>] amd_e400_idle+0x9a/0x120
Mar 17 19:32:47 [98071.093614]  [<ffffffff8100a21a>] cpu_idle+0xba/0x100
Mar 17 19:32:47 [98071.093616]  [<ffffffff813e6169>] start_secondary+0x202/0x209
Mar 17 19:32:47 [98071.093618] ---[ end trace 4fecd84b3e9e66ee ]---
Mar 17 19:32:47 [98071.274828] ------------[ cut here ]------------
Comment 1 Francois Romieu 2012-03-20 10:08:08 UTC
It looks similar to http://marc.info/?l=linux-netdev&m=133222870601241&w=2.

You should try 3.0.25.

-- 
Ueimor
Comment 2 warpme 2012-03-25 10:27:11 UTC
(In reply to comment #1)
> It looks similar to http://marc.info/?l=linux-netdev&m=133222870601241&w=2.
> 
> You should try 3.0.25.
> 
> -- 
> Ueimor

Hi,
I switch to 3.0.25 few days ago. Downloaded this malicious torrent 5x again and it seems that problem is solved. We can wait next few days and if there will be no traps - ticket might be closed with status solved.

Thx for Your help !

Note You need to log in before you can comment on or make changes to this bug.