Re: WARNING: at net/ipv4/tcp_input.c:2173 tcp_mark_head_lost+0x173/0x1a0()

From: Ilpo Järvinen
Date: Fri Apr 04 2008 - 15:48:44 EST


On Fri, 4 Apr 2008, Robin H. Johnson wrote:

> On Thu, Apr 03, 2008 at 09:20:38PM -0700, Andrew Morton wrote:
> > On Thu, 3 Apr 2008 21:19:13 -0700 Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> wrote:
> >
> > >
> > > (cc netdev)
> > >
> > > (and Rafael - I assume 2.6.24 didn't do this..)
> >
> > urgh.
> >
> > > On Wed, 2 Apr 2008 15:41:37 -0700 "Robin H. Johnson" <robbat2@xxxxxxxxxx> wrote:
> > >
> > > > (Please CC, not on LKML).
> > > >
> > > > One of the nodes in my web-serving cluster (isohunt.com) started showing this:
> > > >
> > > > ------------[ cut here ]------------
> > > > WARNING: at net/ipv4/tcp_input.c:2173 tcp_mark_head_lost+0x173/0x1a0()
> > > > Modules linked in: lm85 hwmon_vid nfs lockd nfs_acl sunrpc bonding reiserfs k8temp hwmon i2c_nforce2 i2c_core sg
> > > > Pid: 32500, comm: php-cgi Not tainted 2.6.25-rc4-git2 #7
> > I misread that as -rc8.
> > We fixed a lot of stuff since -rc4. Please retest current mainline?
>
> Hopefully this is new enough. -git3 was released right while I was writing this
> email after testing, and I don't see anything in there that seems related.
>
> ------------[ cut here ]------------
> WARNING: at net/ipv4/tcp_input.c:1771 tcp_enter_frto+0x2bb/0x2c0()

Is this _the first one_ you encounter? It's very strange place because
tcp_enter_frto won't touch those sacked_out / lost_out counters at all
so it hardly could cause an overflow there.



--
i.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/