All of lore.kernel.org
 help / color / mirror / Atom feed
From: Byron Albert <byron@markerman.com>
To: linux-kernel@vger.kernel.org
Subject: af_inet.c and tcp.c kernel assertions with 2.4.20
Date: Sun, 05 Jan 2003 18:28:30 -0500	[thread overview]
Message-ID: <3E18BF9E.3060303@markerman.com> (raw)

[-- Attachment #1: Type: text/plain, Size: 4655 bytes --]

I have been getting a few of these on  linux 2.4.20 runing on rehdat 7.2 
on a new dual p4 zeon box.  I have atached my dmesg and .config it is a 
webserver running about 500-apache proccesses . This sounds like a bad 
thing. It has been up for 20 days

Byron

KERNEL: assertion (newsk->state != TCP_SYN_RECV) failed at tcp.c(2229)
KERNEL: assertion 
((1<<sk2->state)&(TCPF_ESTABLISHED|TCPF_CLOSE_WAIT|TCPF_CLOSE)) failed 
at af_inet.c(689)

KERNEL: assertion (newsk->state != TCP_SYN_RECV) failed at tcp.c(2229)
KERNEL: assertion 
((1<<sk2->state)&(TCPF_ESTABLISHED|TCPF_CLOSE_WAIT|TCPF_CLOSE)) failed 
at af_inet.c(689)
KERNEL: assertion (newsk->state != TCP_SYN_RECV) failed at tcp.c(2229)
KERNEL: assertion 
((1<<sk2->state)&(TCPF_ESTABLISHED|TCPF_CLOSE_WAIT|TCPF_CLOSE)) failed 
at af_inet.c(689)
KERNEL: assertion (newsk->state != TCP_SYN_RECV) failed at tcp.c(2229)
KERNEL: assertion 
((1<<sk2->state)&(TCPF_ESTABLISHED|TCPF_CLOSE_WAIT|TCPF_CLOSE)) failed 
at af_inet.c(689)
TCP: Treason uncloaked! Peer 66.178.46.12:4106/80 shrinks window 
3684316462:3684316463. Repaired.
TCP: Treason uncloaked! Peer 192.116.183.161:2396/80 shrinks window 
4082344538:4082346728. Repaired.
TCP: Treason uncloaked! Peer 192.116.183.161:2398/80 shrinks window 
4090413365:4090416285. Repaired.
TCP: Treason uncloaked! Peer 192.116.183.161:2396/80 shrinks window 
4082440168:4082441628. Repaired.
TCP: Treason uncloaked! Peer 192.116.183.161:2396/80 shrinks window 
4082443088:4082444548. Repaired.
TCP: Treason uncloaked! Peer 192.116.183.161:2396/80 shrinks window 
4082446008:4082447468. Repaired.
TCP: Treason uncloaked! Peer 151.144.150.81:3311/80 shrinks window 
4097592766:4097593278. Repaired.
TCP: Treason uncloaked! Peer 151.144.150.81:3311/80 shrinks window 
4097592766:4097593278. Repaired.
TCP: Treason uncloaked! Peer 192.116.183.161:2396/80 shrinks window 
4082507198:4082510118. Repaired.
TCP: Treason uncloaked! Peer 203.200.72.92:63913/80 shrinks window 
3691060735:3691061011. Repaired.
TCP: Treason uncloaked! Peer 203.200.72.92:63913/80 shrinks window 
3691060735:3691061011. Repaired.
KERNEL: assertion (newsk->state != TCP_SYN_RECV) failed at tcp.c(2229)
KERNEL: assertion 
((1<<sk2->state)&(TCPF_ESTABLISHED|TCPF_CLOSE_WAIT|TCPF_CLOSE)) failed 
at af_inet.c(689)
TCP: Treason uncloaked! Peer 195.8.175.5:2002/80 shrinks window 
3054537745:3054544248. Repaired.
TCP: Treason uncloaked! Peer 195.8.175.5:2945/80 shrinks window 
3270899213:3270899943. Repaired.
TCP: Treason uncloaked! Peer 195.8.175.5:4878/80 shrinks window 
3749760763:3749765855. Repaired.
TCP: Treason uncloaked! Peer 200.167.121.61:1025/80 shrinks window 
1652796314:1652799234. Repaired.
TCP: drop open request from 80.235.22.34/2025
TCP: drop open request from 80.235.22.34/3868
TCP: drop open request from 141.201.222.102/3445
TCP: drop open request from 80.235.22.34/3869
TCP: drop open request from 212.90.78.229/2193
TCP: drop open request from 141.201.222.102/3446
TCP: drop open request from 80.235.22.34/3870
TCP: drop open request from 80.235.22.34/3871
TCP: drop open request from 80.235.22.34/3872
TCP: drop open request from 217.121.84.134/49332
TCP: drop open request from 217.121.84.134/49333
NET: 10 messages suppressed.
TCP: drop open request from 193.111.208.10/1958
NET: 47 messages suppressed.
TCP: drop open request from 80.235.22.34/4166
NET: 13 messages suppressed.
TCP: drop open request from 80.235.22.34/4979
TCP: drop open request from 80.235.22.34/4980
TCP: drop open request from 80.235.22.34/4981
TCP: drop open request from 80.235.22.34/4982
TCP: drop open request from 212.14.234.52/42033
TCP: drop open request from 80.160.94.32/38348
NET: 38 messages suppressed.
TCP: drop open request from 80.235.22.34/1132
KERNEL: assertion (newsk->state != TCP_SYN_RECV) failed at tcp.c(2229)
KERNEL: assertion 
((1<<sk2->state)&(TCPF_ESTABLISHED|TCPF_CLOSE_WAIT|TCPF_CLOSE)) failed 
at af_inet.c(689)
NET: 6 messages suppressed.
TCP: Treason uncloaked! Peer 195.166.237.34:1766/80 shrinks window 
351707493:351707494. Repaired.
TCP: Treason uncloaked! Peer 195.166.237.34:1766/80 shrinks window 
351707493:351707494. Repaired.
TCP: Treason uncloaked! Peer 195.166.237.34:1766/80 shrinks window 
351707493:351707494. Repaired.
TCP: Treason uncloaked! Peer 195.166.237.34:3526/80 shrinks window 
1649592966:1649592967. Repaired.
ip_conntrack: table full, dropping packet.
TCP: Treason uncloaked! Peer 148.76.65.150:3513/80 shrinks window 
1686151324:1686151544. Repaired.
KERNEL: assertion (newsk->state != TCP_SYN_RECV) failed at tcp.c(2229)
KERNEL: assertion 
((1<<sk2->state)&(TCPF_ESTABLISHED|TCPF_CLOSE_WAIT|TCPF_CLOSE)) failed 
at af_inet.c(689)

[-- Attachment #2: .config --]
[-- Type: application/x-java-applet, Size: 18090 bytes --]

[-- Attachment #3: dmesg --]
[-- Type: application/x-java-applet, Size: 7593 bytes --]

                 reply	other threads:[~2003-01-05 23:20 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=3E18BF9E.3060303@markerman.com \
    --to=byron@markerman.com \
    --cc=linux-kernel@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.