Bug#771224: linux-image-3.16.0-4-amd64: Recurring traces from tcp_fragment+0x2b1/0x2c0 (linux-3.16.7/net/ipv4/tcp_output.c:1085)
Package: src:linux Version: 3.16.7-ckt11-1+deb8u5 Followup-For: Bug #771224 Dear Maintainer, this bug still exists in Jessie. Here is a "me too" report. The server is in Hetzner. -- Package-specific info: ** Version: Linux version 3.16.0-4-amd64 (debian-ker...@lists.debian.org) (gcc version 4.8.4 (Debian 4.8.4-1) ) #1 SMP Debian 3.16.7-ckt11-1+deb8u5 (2015-10-09) ** Command line: BOOT_IMAGE=/vmlinuz-2.6.32-5-amd64 root=UUID=f70b7de0-5577-4ffb-bc9e-5e73f9b288ea ro ** Tainted: W (512) * Taint on warning. ** Kernel log: [6.371521] EXT4-fs (md1): mounted filesystem with ordered data mode. Opts: (null) [6.452111] EXT4-fs (md3): warning: maximal mount count reached, running e2fsck is recommended [6.475137] EXT4-fs (md3): mounted filesystem with ordered data mode. Opts: (null) [7.229397] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready [ 10.451956] e1000e: eth0 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: None [ 10.455476] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 12.375512] ip_tables: (C) 2000-2006 Netfilter Core Team [10135.878195] perf interrupt took too long (2502 > 2500), lowering kernel.perf_event_max_sample_rate to 5 [60360.290515] md: data-check of RAID array md0 [60360.290536] md: minimum _guaranteed_ speed: 1000 KB/sec/disk. [60360.290555] md: using maximum available idle IO bandwidth (but not more than 20 KB/sec) for data-check. [60360.290582] md: using 128k window, over a total of 33553336k. [60360.442633] md: delaying data-check of md1 until md0 has finished (they share one or more physical units) [60360.458588] md: delaying data-check of md2 until md1 has finished (they share one or more physical units) [60360.458592] md: delaying data-check of md1 until md0 has finished (they share one or more physical units) [60360.468454] md: delaying data-check of md3 until md2 has finished (they share one or more physical units) [60360.468455] md: delaying data-check of md2 until md1 has finished (they share one or more physical units) [60360.468456] md: delaying data-check of md1 until md0 has finished (they share one or more physical units) [60721.126288] md: md0: data-check done. [60721.138084] md: delaying data-check of md2 until md1 has finished (they share one or more physical units) [60721.138085] md: delaying data-check of md3 until md2 has finished (they share one or more physical units) [60721.138128] md: data-check of RAID array md1 [60721.138129] md: minimum _guaranteed_ speed: 1000 KB/sec/disk. [60721.138129] md: using maximum available idle IO bandwidth (but not more than 20 KB/sec) for data-check. [60721.138130] md: using 128k window, over a total of 524276k. [60721.154822] md: delaying data-check of md2 until md1 has finished (they share one or more physical units) [60721.154823] md: delaying data-check of md3 until md2 has finished (they share one or more physical units) [60727.121950] md: md1: data-check done. [60727.173642] md: delaying data-check of md3 until md2 has finished (they share one or more physical units) [60727.173643] md: data-check of RAID array md2 [60727.173645] md: minimum _guaranteed_ speed: 1000 KB/sec/disk. [60727.173646] md: using maximum available idle IO bandwidth (but not more than 20 KB/sec) for data-check. [60727.173647] md: using 128k window, over a total of 1073740664k. [60727.235640] md: delaying data-check of md3 until md2 has finished (they share one or more physical units) [73365.306433] md: md2: data-check done. [73365.319172] md: data-check of RAID array md3 [73365.319195] md: minimum _guaranteed_ speed: 1000 KB/sec/disk. [73365.319211] md: using maximum available idle IO bandwidth (but not more than 20 KB/sec) for data-check. [73365.319237] md: using 128k window, over a total of 1822442815k. [103239.101669] md: md3: data-check done. [436011.956911] [ cut here ] [436011.956933] WARNING: CPU: 1 PID: 0 at /build/linux-xkTWug/linux-3.16.7-ckt11/net/ipv4/tcp_output.c:1085 tcp_fragment+0x2b1/0x2c0() [436011.956963] Modules linked in: ipt_MASQUERADE ipt_REJECT cpufreq_conservative xt_tcpudp cpufreq_powersave iptable_nat nf_nat_ipv4 nf_nat cpufreq_stats cpufreq_userspace xt_conntrack xt_multiport iptable_raw xt_CT iptable_filter ip_tables x_tables nf_conntrack_ipv4 nf_defrag_ipv4 nf_conntrack x86_pkg_temp_thermal intel_powerclamp intel_rapl coretemp kvm_intel kvm crc32_pclmul ghash_clmulni_intel aesni_intel i915 aes_x86_64 lrw i2c_i801 gf128mul glue_helper drm_kms_helper drm i2c_algo_bit ablk_helper i2c_core cryptd eeepc_wmi asus_wmi sparse_keymap rfkill wmi evdev serio_raw iTCO_wdt iTCO_vendor_support button mei_me shpchp video mei lpc_ich tpm_infineon tpm_tis tpm pcspkr mfd_core ext4 crc16 mbcache jbd2 aacraid 3w_9xxx 3w_ raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx [436011.957222] xor raid6_pq raid1 raid0 md_mod sata_nv sata_sil sata_via sg sd_mod crc_t10dif crct10dif_generic ahci libahci lib
Bug#771224: linux-image-3.16.0-4-amd64: Recurring traces from tcp_fragment+0x2b1/0x2c0 (linux-3.16.7/net/ipv4/tcp_output.c:1085)
Control: notfound 771224 4.0.8-2 So i have been running 4.x.y series kernel for some time now, and i have not seen those traces in 4.x.y kernel so far. I believe it means that it was fixed upstream and bug can be closed accordingly. Thanks! PS: i do not know how to close bugs here, or if the first line of this mail is correct Roman. -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Bug#771224: linux-image-3.16.0-4-amd64: Recurring traces from tcp_fragment+0x2b1/0x2c0 (linux-3.16.7/net/ipv4/tcp_output.c:1085)
Hi. Yes, i'm still getting both of them using current sid kernel - 3.16.7-ckt9-2 >From my current (today's) dmesg: [ 1747.100540] [ cut here ] [ 1747.100556] WARNING: CPU: 6 PID: 0 at /build/linux-oP9w_T/linux-3.16.7-ckt9/net/ipv4/tcp_output.c:1085 tcp_fragment+0x2b1/0x2c0() [ 1747.100564] Modules linked in: cfg80211 cpufreq_userspace cpufreq_stats cpufreq_powersave cpufreq_conservative binfmt_misc nfsd auth_rpcgss oid_registry nfs_acl nfs lockd fscache sunrpc nls_utf8 joydev hid_generic nls_cp437 usbhid vfat fat hid fglrx(PO) eeepc_wmi asus_wmi sparse_keymap kvm_amd kvm rfkill video mxm_wmi crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd xhci_hcd ohci_pci efi_pstore ehci_pci snd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_codec_generic evdev serio_raw ohci_hcd pcspkr edac_mce_amd efivars ehci_hcd fam15h_power edac_core k10temp e1000e usbcore tpm_infineon snd_hda_intel snd_hda_controller snd_hda_codec snd_hwdep sg snd_pcm ptp tpm_tis pps_core usb_common tpm snd_timer sp5100_tco wmi snd i2c_piix4 i2c_core button soundcore [ 1747.100601] processor shpchp thermal_sys tcp_yeah tcp_vegas it87 hwmon_vid loop fuse parport_pc ppdev lp parport autofs4 dm_mod crc32c_generic btrfs xor raid6_pq sd_mod crc_t10dif crct10dif_generic crct10dif_pclmul crct10dif_common crc32c_intel ahci libahci libata scsi_mod [ 1747.100621] CPU: 6 PID: 0 Comm: swapper/6 Tainted: P O 3.16.0-4-amd64 #1 Debian 3.16.7-ckt9-2 [ 1747.100624] Hardware name: To be filled by O.E.M. To be filled by O.E.M./CROSSHAIR V FORMULA-Z, BIOS 2101 04/17/2014 [ 1747.100629] 0009 8150ac86 81067747 [ 1747.100632] 8806804c1800 88067ce74740 0007 0024 [ 1747.100635] 7e0a5a60 8146e901 8806804c1800 88067ce74740 [ 1747.100639] Call Trace: [ 1747.100642][] ? dump_stack+0x41/0x51 [ 1747.100649] [] ? warn_slowpath_common+0x77/0x90 [ 1747.100653] [] ? tcp_fragment+0x2b1/0x2c0 [ 1747.100656] [] ? tcp_mark_head_lost+0x19e/0x260 [ 1747.100660] [] ? tcp_fastretrans_alert+0x626/0xac0 [ 1747.100663] [] ? tcp_ack+0x86d/0x11b0 [ 1747.100669] [] ? tcp_rcv_established+0x1a1/0x6c0 [ 1747.100672] [] ? iommu_area_alloc+0x75/0x90 [ 1747.100677] [] ? tcp_v4_do_rcv+0x1af/0x4c0 [ 1747.100680] [] ? tcp_v4_rcv+0x696/0x7a0 [ 1747.100682] [] ? __inet_lookup_established+0x3f/0x120 [ 1747.100685] [] ? ip_local_deliver_finish+0x9e/0x200 [ 1747.100688] [] ? __netif_receive_skb_core+0x533/0x750 [ 1747.100694] [] ? read_tsc+0x5/0x20 [ 1747.100699] [] ? netif_receive_skb_internal+0x1f/0x90 [ 1747.100701] [] ? napi_gro_receive+0xb0/0xe0 [ 1747.100711] [] ? e1000_clean_rx_irq+0x27b/0x460 [e1000e] [ 1747.100718] [] ? e1000e_poll+0x6c/0x2d0 [e1000e] [ 1747.100724] [] ? net_rx_action+0x140/0x240 [ 1747.100729] [] ? __do_softirq+0xf1/0x290 [ 1747.100734] [] ? irq_exit+0x95/0xa0 [ 1747.100738] [] ? do_IRQ+0x52/0xe0 [ 1747.100743] [] ? common_interrupt+0x6d/0x6d [ 1747.100746][] ? cpuidle_enter_state+0x4f/0xc0 [ 1747.100752] [] ? cpuidle_enter_state+0x48/0xc0 [ 1747.100756] [] ? cpu_startup_entry+0x2f8/0x400 [ 1747.100763] [] ? start_secondary+0x20f/0x2d0 [ 1747.100765] ---[ end trace c9aea56915e1a597 ]--- Roman. On Wed, Apr 15, 2015 at 9:16 PM, Ben Hutchings wrote: > Control: tag -1 moreinfo > > On Thu, 27 Nov 2014 21:21:56 +0400 Lebedev Roman > wrote: > > Package: src:linux > > Version: 3.16.7-2 > > Severity: normal > > > > Dear Maintainer, > > > > When there is some network activity, following trace is reliably > recurring in dmesg: > > > > [34221.894283] [ cut here ] > > [34221.894286] WARNING: CPU: 6 PID: 0 at > /build/linux-Y9HjRe/linux-3.16.7/net/ipv4/tcp_output.c:1085 > tcp_fragment+0x2b1/0x2c0() > [...] > > Sorry we didn't respond to this earlier. Do these warnings still appear > under the current kernel version in testing/unstable? > > Ben. > > -- > Ben Hutchings > Editing code like this is akin to sticking plasters on the bleeding stump > of a severed limb. - me, 29 June 1999 >
Bug#771224: linux-image-3.16.0-4-amd64: Recurring traces from tcp_fragment+0x2b1/0x2c0 (linux-3.16.7/net/ipv4/tcp_output.c:1085)
Control: tag -1 moreinfo On Thu, 27 Nov 2014 21:21:56 +0400 Lebedev Roman wrote: > Package: src:linux > Version: 3.16.7-2 > Severity: normal > > Dear Maintainer, > > When there is some network activity, following trace is reliably recurring in > dmesg: > > [34221.894283] [ cut here ] > [34221.894286] WARNING: CPU: 6 PID: 0 at > /build/linux-Y9HjRe/linux-3.16.7/net/ipv4/tcp_output.c:1085 > tcp_fragment+0x2b1/0x2c0() [...] Sorry we didn't respond to this earlier. Do these warnings still appear under the current kernel version in testing/unstable? Ben. -- Ben Hutchings Editing code like this is akin to sticking plasters on the bleeding stump of a severed limb. - me, 29 June 1999 signature.asc Description: This is a digitally signed message part
Bug#771224: linux-image-3.16.0-4-amd64: Recurring traces from tcp_fragment+0x2b1/0x2c0 (linux-3.16.7/net/ipv4/tcp_output.c:1085)
Package: src:linux Version: 3.16.7-2 Severity: normal Dear Maintainer, When there is some network activity, following trace is reliably recurring in dmesg: [34221.894283] [ cut here ] [34221.894286] WARNING: CPU: 6 PID: 0 at /build/linux-Y9HjRe/linux-3.16.7/net/ipv4/tcp_output.c:1085 tcp_fragment+0x2b1/0x2c0() [34221.894288] Modules linked in: cpufreq_userspace cpufreq_stats cpufreq_powersave cpufreq_conservative binfmt_misc cfg80211 nfsd auth_rpcgss oid_registry nfs_acl nfs lockd fscache sunrpc fglrx(PO) joydev hid_generic nls_utf8 nls_cp437 usbhid vfat fat hid kvm_amd kvm crc32_pclmul ghash_clmulni_intel eeepc_wmi aesni_intel asus_wmi aes_x86_64 sparse_keymap lrw rfkill gf128mul mxm_wmi video glue_helper ablk_helper snd_hda_codec_realtek snd_hda_codec_generic cryptd snd_hda_codec_hdmi ohci_pci ohci_hcd xhci_hcd pcspkr snd_hda_intel ehci_pci efi_pstore evdev ehci_hcd snd_hda_controller serio_raw efivars e1000e snd_hda_codec sg tpm_infineon sp5100_tco edac_mce_amd k10temp snd_hwdep tpm_tis usbcore ptp button tpm fam15h_power wmi snd_pcm edac_core pps_core usb_common i2c_piix4 i2c_core shpchp snd_timer snd [34221.894312] soundcore processor thermal_sys tcp_yeah tcp_vegas it87 hwmon_vid loop fuse parport_pc ppdev lp parport autofs4 dm_mod crc32c_generic btrfs xor raid6_pq sd_mod crc_t10dif crct10dif_generic crct10dif_pclmul crct10dif_common crc32c_intel ahci libahci libata scsi_mod [34221.894322] CPU: 6 PID: 0 Comm: swapper/6 Tainted: PW O 3.16.0-4-amd64 #1 Debian 3.16.7-2 [34221.894324] Hardware name: To be filled by O.E.M. To be filled by O.E.M./CROSSHAIR V FORMULA-Z, BIOS 2101 04/17/2014 [34221.894326] 0009 81506b43 81065717 [34221.894328] 880630626000 88009458e780 0002 0090 [34221.894331] 75055ada 8146a751 880630626000 88009458e780 [34221.894333] Call Trace: [34221.894335][] ? dump_stack+0x41/0x51 [34221.894339] [] ? warn_slowpath_common+0x77/0x90 [34221.894342] [] ? tcp_fragment+0x2b1/0x2c0 [34221.894344] [] ? tcp_mark_head_lost+0x19e/0x260 [34221.894347] [] ? tcp_fastretrans_alert+0x626/0xac0 [34221.894349] [] ? tcp_ack+0x86d/0x11b0 [34221.894352] [] ? tcp_rcv_established+0x1a1/0x6c0 [34221.894355] [] ? iommu_area_alloc+0x75/0x90 [34221.894358] [] ? tcp_v4_do_rcv+0x1af/0x4c0 [34221.894361] [] ? tcp_v4_rcv+0x696/0x7a0 [34221.894363] [] ? __inet_lookup_established+0x3f/0x120 [34221.894366] [] ? ip_local_deliver_finish+0x9e/0x200 [34221.894369] [] ? __netif_receive_skb_core+0x533/0x750 [34221.894371] [] ? read_tsc+0x5/0x20 [34221.894374] [] ? netif_receive_skb_internal+0x1f/0x90 [34221.894376] [] ? napi_gro_receive+0xb0/0xe0 [34221.894382] [] ? e1000_clean_rx_irq+0x27b/0x460 [e1000e] [34221.894388] [] ? e1000e_poll+0x6c/0x2d0 [e1000e] [34221.894391] [] ? net_rx_action+0x140/0x240 [34221.894395] [] ? __do_softirq+0xf1/0x290 [34221.894398] [] ? irq_exit+0x95/0xa0 [34221.894401] [] ? do_IRQ+0x52/0xe0 [34221.894403] [] ? common_interrupt+0x6d/0x6d [34221.894405][] ? __hrtimer_start_range_ns+0x1cd/0x390 [34221.894409] [] ? cpuidle_enter_state+0x4f/0xc0 [34221.894412] [] ? cpuidle_enter_state+0x48/0xc0 [34221.894415] [] ? cpu_startup_entry+0x2f8/0x400 [34221.894418] [] ? start_secondary+0x20f/0x2d0 [34221.894420] ---[ end trace bc67e0a52a4f614c ]--- -- Package-specific info: ** Version: Linux version 3.16.0-4-amd64 (debian-ker...@lists.debian.org) (gcc version 4.8.3 (Debian 4.8.3-13) ) #1 SMP Debian 3.16.7-2 (2014-11-06) ** Command line: BOOT_IMAGE=/boot/vmlinuz-3.16.0-4-amd64 root=UUID=f99a9c37-6cc5-4c06-82b8-5f70809512a8 ro cgroup_enable=memory swapaccount=1 ** Tainted: PWO (4609) * Proprietary module has been loaded. * Taint on warning. * Out-of-tree module has been loaded. ** Kernel log: [21069.582094] UDP: bad checksum. From 41.135.11.117:6881 to 192.168.1.4:6881 ulen 34 [21201.745199] UDP: bad checksum. From 41.135.11.117:6881 to 192.168.1.4:6881 ulen 34 [21227.128723] UDP: bad checksum. From 41.135.11.117:6881 to 192.168.1.4:6881 ulen 34 [21227.148880] UDP: bad checksum. From 41.135.11.117:6881 to 192.168.1.4:6881 ulen 34 [21271.723062] UDP: bad checksum. From 41.135.11.117:6881 to 192.168.1.4:6881 ulen 32 [21273.061459] UDP: bad checksum. From 41.135.11.117:6881 to 192.168.1.4:6881 ulen 34 [21302.071112] UDP: bad checksum. From 41.135.11.117:6881 to 192.168.1.4:6881 ulen 33 [21322.619729] UDP: bad checksum. From 41.135.11.117:6881 to 192.168.1.4:6881 ulen 28 [21351.629926] UDP: bad checksum. From 41.135.11.117:6881 to 192.168.1.4:6881 ulen 28 [21355.690741] UDP: bad checksum. From 41.135.11.117:6881 to 192.168.1.4:6881 ulen 28 [21473.712591] UDP: bad checksum. From 41.135.11.117:6881 to 192.168.1.4:6881 ulen 34 [21480.965252] UDP: bad checksum. From 41.135.11.117:6881 to 192.168.1.4:6881 ulen 34 [21499.096416] UDP: bad checksum. From 41.135.11.117:6881 to 192.168.1.4:6881 ulen 34 [21606