lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Sat, 5 Mar 2016 07:44:25 +1000
From:	Dave Airlie <airlied@...il.com>
To:	LKML <linux-kernel@...r.kernel.org>,
	Linus Torvalds <torvalds@...ux-foundation.org>
Subject: headsup: random memory corruption on 4.5-rc5

So I've gotten two random memory corruptions on my haswell laptop over
the past week,

one caused my e1000 driver to crap out, and one in ext4

I've lost the e1000 trace it never made it to disk,

I've been running a lot of VMs on this with the standard virtio hw, as
well as usual desktop stuff and compiling things.

I'm going to go to -rc6 and see how things go, but I've no obvious
trigger at this point. I'll probably run slub_debug enabled as well.

Dave.

Mar 03 07:05:54 tyrion-bne-redhat-com kernel: ------------[ cut here
]------------
Mar 03 07:05:54 tyrion-bne-redhat-com kernel: kernel BUG at mm/slub.c:3625!
Mar 03 07:05:55 tyrion-bne-redhat-com kernel: invalid opcode: 0000 [#1] SMP
Mar 03 07:05:55 tyrion-bne-redhat-com kernel: Modules linked in:
xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_n
Mar 03 07:05:55 tyrion-bne-redhat-com kernel:  snd_hda_codec_hdmi
lpc_ich media mei_me rtsx_pci snd_hda_intel snd_hda_codec mfd_cor
Mar 03 07:05:55 tyrion-bne-redhat-com kernel: CPU: 0 PID: 15831 Comm:
Cache2 I/O Not tainted 4.5.0-rc5+ #31
Mar 03 07:05:55 tyrion-bne-redhat-com kernel: Hardware name: LENOVO
20ARS25701/20ARS25701, BIOS GJET72WW (2.22 ) 02/21/2014
Mar 03 07:05:55 tyrion-bne-redhat-com kernel: task: ffff88014050ad00
ti: ffff8802bc814000 task.ti: ffff8802bc814000
Mar 03 07:05:55 tyrion-bne-redhat-com kernel: RIP:
0010:[<ffffffff8122dfbb>]  [<ffffffff8122dfbb>] kfree+0x26b/0x270
Mar 03 07:05:55 tyrion-bne-redhat-com kernel: RSP:
0018:ffff8802bc817cc0  EFLAGS: 00010246
Mar 03 07:05:55 tyrion-bne-redhat-com kernel: RAX: ffffea00065a47e0
RBX: ffff880200000001 RCX: 000000000000000f
Mar 03 07:05:55 tyrion-bne-redhat-com kernel: RDX: 0000000000000000
RSI: ffff880235335000 RDI: 0000000000000246
Mar 03 07:05:55 tyrion-bne-redhat-com kernel: RBP: ffff8802bc817ce8
R08: ffff880235335000 R09: 0000000000000000
Mar 03 07:05:55 tyrion-bne-redhat-com kernel: R10: 0000000000000000
R11: 0000000000000000 R12: 00000000ffffffff
Mar 03 07:05:55 tyrion-bne-redhat-com kernel: R13: ffffffff8131cf69
R14: ffffea0008000000 R15: ffff88006c12c5b8
Mar 03 07:05:55 tyrion-bne-redhat-com kernel: FS:
00007f9b9a30b700(0000) GS:ffff88031e200000(0000)
knlGS:0000000000000000
Mar 03 07:05:55 tyrion-bne-redhat-com kernel: CS:  0010 DS: 0000 ES:
0000 CR0: 0000000080050033
Mar 03 07:05:55 tyrion-bne-redhat-com kernel: CR2: 00007f9b9919f000
CR3: 00000002d1f7e000 CR4: 00000000001426f0
Mar 03 07:05:55 tyrion-bne-redhat-com kernel: Stack:
Mar 03 07:05:55 tyrion-bne-redhat-com kernel:  ffff880200000001
00000000ffffffff ffff88006c12c3c8 0000000000000000
Mar 03 07:05:55 tyrion-bne-redhat-com kernel:  ffff88006c12c5b8
ffff8802bc817de0 ffffffff8131cf69 ffff8802bc817d08
Mar 03 07:05:55 tyrion-bne-redhat-com kernel:  ffffffff81116e2d
ffff8802bc817d98 ffff88006c12c3c8 0000000000000000
Mar 03 07:05:55 tyrion-bne-redhat-com kernel: Call Trace:
Mar 03 07:05:55 tyrion-bne-redhat-com kernel:  [<ffffffff8131cf69>]
ext4_ext_remove_space+0xba9/0x1410
Mar 03 07:05:55 tyrion-bne-redhat-com kernel:  [<ffffffff81116e2d>] ?
debug_lockdep_rcu_enabled+0x1d/0x20
Mar 03 07:05:55 tyrion-bne-redhat-com kernel:  [<ffffffff8131f1a4>]
ext4_ext_truncate+0xb4/0xe0
Mar 03 07:05:55 tyrion-bne-redhat-com kernel:  [<ffffffff812f2849>]
ext4_truncate+0x429/0x560
Mar 03 07:05:55 tyrion-bne-redhat-com kernel:  [<ffffffff812f38df>]
ext4_evict_inode+0x58f/0x640
Mar 03 07:05:55 tyrion-bne-redhat-com kernel:  [<ffffffff812705a8>]
evict+0xb8/0x180
Mar 03 07:05:55 tyrion-bne-redhat-com kernel:  [<ffffffff81270920>]
iput+0x240/0x2e0
Mar 03 07:05:55 tyrion-bne-redhat-com kernel:  [<ffffffff8126344c>]
do_unlinkat+0x1bc/0x280
Mar 03 07:05:55 tyrion-bne-redhat-com kernel:  [<ffffffff81263e66>]
SyS_unlink+0x16/0x20
Mar 03 07:05:55 tyrion-bne-redhat-com kernel:  [<ffffffff817e5032>]
entry_SYSCALL_64_fastpath+0x12/0x76
Mar 03 07:05:55 tyrion-bne-redhat-com kernel: Code: ff ff 4d 89 f9 41
b8 01 00 00 00 48 89 d9 48 89 da 4c 89 f6 4c 89 ef e8 44 f4 f
Mar 03 07:05:55 tyrion-bne-redhat-com kernel: RIP
[<ffffffff8122dfbb>] kfree+0x26b/0x270

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ