From: Byron Albert <byron@markerman.com>
To: linux-kernel@vger.kernel.org
Subject: af_inet.c and tcp.c kernel assertions with 2.4.20
Date: Sun, 05 Jan 2003 18:28:30 -0500 [thread overview]
Message-ID: <3E18BF9E.3060303@markerman.com> (raw)
[-- Attachment #1: Type: text/plain, Size: 4655 bytes --]
I have been getting a few of these on linux 2.4.20 runing on rehdat 7.2
on a new dual p4 zeon box. I have atached my dmesg and .config it is a
webserver running about 500-apache proccesses . This sounds like a bad
thing. It has been up for 20 days
Byron
KERNEL: assertion (newsk->state != TCP_SYN_RECV) failed at tcp.c(2229)
KERNEL: assertion
((1<<sk2->state)&(TCPF_ESTABLISHED|TCPF_CLOSE_WAIT|TCPF_CLOSE)) failed
at af_inet.c(689)
KERNEL: assertion (newsk->state != TCP_SYN_RECV) failed at tcp.c(2229)
KERNEL: assertion
((1<<sk2->state)&(TCPF_ESTABLISHED|TCPF_CLOSE_WAIT|TCPF_CLOSE)) failed
at af_inet.c(689)
KERNEL: assertion (newsk->state != TCP_SYN_RECV) failed at tcp.c(2229)
KERNEL: assertion
((1<<sk2->state)&(TCPF_ESTABLISHED|TCPF_CLOSE_WAIT|TCPF_CLOSE)) failed
at af_inet.c(689)
KERNEL: assertion (newsk->state != TCP_SYN_RECV) failed at tcp.c(2229)
KERNEL: assertion
((1<<sk2->state)&(TCPF_ESTABLISHED|TCPF_CLOSE_WAIT|TCPF_CLOSE)) failed
at af_inet.c(689)
TCP: Treason uncloaked! Peer 66.178.46.12:4106/80 shrinks window
3684316462:3684316463. Repaired.
TCP: Treason uncloaked! Peer 192.116.183.161:2396/80 shrinks window
4082344538:4082346728. Repaired.
TCP: Treason uncloaked! Peer 192.116.183.161:2398/80 shrinks window
4090413365:4090416285. Repaired.
TCP: Treason uncloaked! Peer 192.116.183.161:2396/80 shrinks window
4082440168:4082441628. Repaired.
TCP: Treason uncloaked! Peer 192.116.183.161:2396/80 shrinks window
4082443088:4082444548. Repaired.
TCP: Treason uncloaked! Peer 192.116.183.161:2396/80 shrinks window
4082446008:4082447468. Repaired.
TCP: Treason uncloaked! Peer 151.144.150.81:3311/80 shrinks window
4097592766:4097593278. Repaired.
TCP: Treason uncloaked! Peer 151.144.150.81:3311/80 shrinks window
4097592766:4097593278. Repaired.
TCP: Treason uncloaked! Peer 192.116.183.161:2396/80 shrinks window
4082507198:4082510118. Repaired.
TCP: Treason uncloaked! Peer 203.200.72.92:63913/80 shrinks window
3691060735:3691061011. Repaired.
TCP: Treason uncloaked! Peer 203.200.72.92:63913/80 shrinks window
3691060735:3691061011. Repaired.
KERNEL: assertion (newsk->state != TCP_SYN_RECV) failed at tcp.c(2229)
KERNEL: assertion
((1<<sk2->state)&(TCPF_ESTABLISHED|TCPF_CLOSE_WAIT|TCPF_CLOSE)) failed
at af_inet.c(689)
TCP: Treason uncloaked! Peer 195.8.175.5:2002/80 shrinks window
3054537745:3054544248. Repaired.
TCP: Treason uncloaked! Peer 195.8.175.5:2945/80 shrinks window
3270899213:3270899943. Repaired.
TCP: Treason uncloaked! Peer 195.8.175.5:4878/80 shrinks window
3749760763:3749765855. Repaired.
TCP: Treason uncloaked! Peer 200.167.121.61:1025/80 shrinks window
1652796314:1652799234. Repaired.
TCP: drop open request from 80.235.22.34/2025
TCP: drop open request from 80.235.22.34/3868
TCP: drop open request from 141.201.222.102/3445
TCP: drop open request from 80.235.22.34/3869
TCP: drop open request from 212.90.78.229/2193
TCP: drop open request from 141.201.222.102/3446
TCP: drop open request from 80.235.22.34/3870
TCP: drop open request from 80.235.22.34/3871
TCP: drop open request from 80.235.22.34/3872
TCP: drop open request from 217.121.84.134/49332
TCP: drop open request from 217.121.84.134/49333
NET: 10 messages suppressed.
TCP: drop open request from 193.111.208.10/1958
NET: 47 messages suppressed.
TCP: drop open request from 80.235.22.34/4166
NET: 13 messages suppressed.
TCP: drop open request from 80.235.22.34/4979
TCP: drop open request from 80.235.22.34/4980
TCP: drop open request from 80.235.22.34/4981
TCP: drop open request from 80.235.22.34/4982
TCP: drop open request from 212.14.234.52/42033
TCP: drop open request from 80.160.94.32/38348
NET: 38 messages suppressed.
TCP: drop open request from 80.235.22.34/1132
KERNEL: assertion (newsk->state != TCP_SYN_RECV) failed at tcp.c(2229)
KERNEL: assertion
((1<<sk2->state)&(TCPF_ESTABLISHED|TCPF_CLOSE_WAIT|TCPF_CLOSE)) failed
at af_inet.c(689)
NET: 6 messages suppressed.
TCP: Treason uncloaked! Peer 195.166.237.34:1766/80 shrinks window
351707493:351707494. Repaired.
TCP: Treason uncloaked! Peer 195.166.237.34:1766/80 shrinks window
351707493:351707494. Repaired.
TCP: Treason uncloaked! Peer 195.166.237.34:1766/80 shrinks window
351707493:351707494. Repaired.
TCP: Treason uncloaked! Peer 195.166.237.34:3526/80 shrinks window
1649592966:1649592967. Repaired.
ip_conntrack: table full, dropping packet.
TCP: Treason uncloaked! Peer 148.76.65.150:3513/80 shrinks window
1686151324:1686151544. Repaired.
KERNEL: assertion (newsk->state != TCP_SYN_RECV) failed at tcp.c(2229)
KERNEL: assertion
((1<<sk2->state)&(TCPF_ESTABLISHED|TCPF_CLOSE_WAIT|TCPF_CLOSE)) failed
at af_inet.c(689)
[-- Attachment #2: .config --]
[-- Type: application/x-java-applet, Size: 18090 bytes --]
[-- Attachment #3: dmesg --]
[-- Type: application/x-java-applet, Size: 7593 bytes --]
reply other threads:[~2003-01-05 23:20 UTC|newest]
Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=3E18BF9E.3060303@markerman.com \
--to=byron@markerman.com \
--cc=linux-kernel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox