lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <bad6ec6fc4e8d43198c0873f2e92d324dc1343eb.camel@sapience.com>
Date: Thu, 05 Dec 2024 17:04:28 -0500
From: Genes Lists <lists@...ience.com>
To: Greg Kroah-Hartman <gregkh@...uxfoundation.org>, 
	linux-kernel@...r.kernel.org, stable@...r.kernel.org
Subject: Re: Linux 6.12.2

On Thu, 2024-12-05 at 14:53 +0100, Greg Kroah-Hartman wrote:
> I'm announcing the release of the 6.12.2 kernel.
> 
> 


6.12.1 works fine but 6.12.2 generates lots of errors during
boot. Tried on several machines all exhibit the same issue. This one is
an older lenovo laptop. They do boot and appear to be working but the
boot errors are worrisome.

It's been several hours since 12.2.2 was released, so others may not
have a problem?

Thought it best to share before I start to work on bisect. config and
dmesg outputs attached.

The beginning of the logs are lost. The first trace I find in dmesg is
below.

thanks

gene


[  311.339926] ------------[ cut here ]------------
[  311.339931] list_add corruption. prev->next should be next
(ffffffff93c5d040), but was 0000000000000000. (prev=f
fff922280ce0370).
[  311.339946] WARNING: CPU: 5 PID: 810 at lib/list_debug.c:32
__list_add_valid_or_report+0x83/0xa0

...
[  311.340080] CPU: 5 UID: 0 PID: 810 Comm: pool-spawner Tainted: G   
W          6.12.2-stable-1 #1 cb3f45e00c
917cdbcd684527448a31ee00f68a7b
[  311.340085] Tainted: [W]=WARN
[  311.340086] Hardware name: LENOVO 20BGCTO1WW/20BGCTO1WW, BIOS
GNET94WW (2.42 ) 06/02/2021
[  311.340088] RIP: 0010:__list_add_valid_or_report+0x83/0xa0
[  311.340093] Code: eb e9 48 89 c1 48 c7 c7 18 61 53 93 e8 76 26 a0 ff
0f 0b eb d6 48 89 d1 48 89 c6 4c 89 c2 48 c
7 c7 68 61 53 93 e8 5d 26 a0 ff <0f> 0b eb bd 48 89 f2 48 89 c1 48 89
fe 48 c7 c7 b8 61 53 93 e8 44
[  311.340095] RSP: 0018:ffffb91dc17fbc20 EFLAGS: 00010086
[  311.340098] RAX: 0000000000000000 RBX: ffff9222dc49a9c0 RCX:
0000000000000027
[  311.340100] RDX: ffff9227e62a18c8 RSI: 0000000000000001 RDI:
ffff9227e62a18c0
[  311.340101] RBP: ffff922280ce0370 R08: 0000000000000000 R09:
ffffb91dc17fbaa0
[  311.340103] R10: ffffffff93c66058 R11: 0000000000000003 R12:
ffff9222dc49ad30
[  311.340104] R13: 0000000000000100 R14: ffffb91dc17fbde0 R15:
ffff92228ccc0d80
[  311.340106] FS:  00007f69f79fe6c0(0000) GS:ffff9227e6280000(0000)
knlGS:0000000000000000
[  311.340108] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  311.340110] CR2: 00007f8d64bda998 CR3: 0000000103516002 CR4:
00000000001726f0

[  311.340112] Call Trace:
[  311.340114]  <TASK>
[  311.340115]  ? __list_add_valid_or_report+0x83/0xa0
[  311.340120]  ? __warn.cold+0x93/0xf6
[  311.340125]  ? __list_add_valid_or_report+0x83/0xa0
[  311.340132]  ? report_bug+0xff/0x140 
[  311.340137]  ? handle_bug+0x58/0x90
[  311.340141]  ? exc_invalid_op+0x17/0x70
[  311.340144]  ? asm_exc_invalid_op+0x1a/0x20
[  311.340152]  ? __list_add_valid_or_report+0x83/0xa0
[  311.340156]  scx_post_fork+0x5b/0x180
[  311.340161]  copy_process+0x2048/0x2710
[  311.340164]  ? __futex_wait+0x159/0x1c0 
[  311.340170]  ? __pfx_futex_wake_mark+0x10/0x10
[  311.340174]  kernel_clone+0xbd/0x420
[  311.340177]  __do_sys_clone3+0xe4/0x130
[  311.340181]  do_syscall_64+0x82/0x160
[  311.340184]  ? do_syscall_64+0x8e/0x160
[  311.340186]  ? exc_page_fault+0x7e/0x180
[  311.340190]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  311.340194] RIP: 0033:0x7f69f931348d


-- 
Gene


Download attachment "klog-12.2.2" of type "application/x-troff-man" (134068 bytes)

View attachment "config" of type "text/plain" (276173 bytes)

Download attachment "signature.asc" of type "application/pgp-signature" (229 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ