| Summary: | [abrt] general protection fault in __kmalloc | ||||||
|---|---|---|---|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Piratmac <piratmac> | ||||
| Component: | kernel | Assignee: | Kernel Maintainer List <kernel-maint> | ||||
| Status: | CLOSED INSUFFICIENT_DATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> | ||||
| Severity: | unspecified | Docs Contact: | |||||
| Priority: | unspecified | ||||||
| Version: | 24 | CC: | gansalmon, ichavero, itamar, jonathan, kernel-maint, madhu.chinakonda, mchehab, mwc | ||||
| Target Milestone: | --- | Flags: | jforbes:
needinfo?
|
||||
| Target Release: | --- | ||||||
| Hardware: | x86_64 | ||||||
| OS: | Unspecified | ||||||
| Whiteboard: | abrt_hash:ced16dca66706c3367253ac460d8d28932a2e9b4;VARIANT_ID=workstation; | ||||||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | 2017-04-28 17:19:42 UTC | Type: | --- | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Attachments: |
|
||||||
|
Description
Piratmac
2016-10-23 15:19:21 UTC
Created attachment 1213246 [details]
File: dmesg
I also recently started seeing random kernel heap corruption: Nov 04 10:03:10 lucy-001 kernel: general protection fault: 0000 [#1] SMP Nov 04 10:03:10 lucy-001 kernel: Modules linked in: vfio_pci vfio_iommu_type1 vfio_virqfd vfio rfcomm ip6t_rpfilter ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_broute bridge ebtable_nat ip6table_raw ip6table_security ip6table_mangle ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 iptable_raw iptable_security iptable_mangle iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack ebtable_filter ebtables ip6table_filter ip6_tables cmac bnep vfat fat intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel intel_cstate intel_uncore intel_rapl_perf btusb mei_wdt dell_wmi btrtl btbcm iTCO_wdt btintel sparse_keymap iTCO_vendor_support dell_smbios bluetooth rfkill joydev dcdbas dell_smm_hwmon snd_hda_codec_realtek Nov 04 10:03:10 lucy-001 kernel: snd_hda_codec_generic snd_hda_codec_hdmi i2c_i801 snd_hda_intel snd_hda_codec snd_hda_core snd_hwdep snd_seq snd_seq_device snd_pcm osst st snd_timer snd shpchp soundcore ie31200_edac edac_core mei_me mei lpc_ich tpm_tis tpm nfsd auth_rpcgss nfs_acl lockd grace sunrpc binfmt_misc nouveau i915 crc32c_intel serio_raw 8021q garp stp llc mrp mxm_wmi ttm aic79xx i2c_algo_bit drm_kms_helper scsi_transport_spi e1000e 8139too drm 8139cp ptp mii pps_core wmi fjes video Nov 04 10:03:10 lucy-001 kernel: CPU: 1 PID: 3067 Comm: Cache2 I/O Not tainted 4.7.9-200.fc24.x86_64 #1 Nov 04 10:03:10 lucy-001 kernel: Hardware name: Dell Inc. Precision T1700/073MMW, BIOS A20 09/22/2016 Nov 04 10:03:10 lucy-001 kernel: task: ffff8803dc338000 ti: ffff8803e1608000 task.ti: ffff8803e1608000 Nov 04 10:03:10 lucy-001 kernel: RIP: 0010:[<ffffffffa1220bc4>] [<ffffffffa1220bc4>] __kmalloc+0xa4/0x220 Nov 04 10:03:10 lucy-001 kernel: RSP: 0018:ffff8803e160bc78 EFLAGS: 00010246 Nov 04 10:03:10 lucy-001 kernel: RAX: 19c288f0ffff8804 RBX: 0000000002088020 RCX: 0000000000000000 Nov 04 10:03:10 lucy-001 kernel: RDX: 0000000000041fba RSI: 0000000000000000 RDI: 000000000001b4a0 Nov 04 10:03:10 lucy-001 kernel: RBP: ffff8803e160bca8 R08: ffff88042ea9b4a0 R09: ffff880419c28a04 Nov 04 10:03:10 lucy-001 kernel: R10: 19c288f0ffff8804 R11: 0000000000000001 R12: 0000000002088020 Nov 04 10:03:10 lucy-001 kernel: R13: 0000000000000004 R14: ffff88041e003cc0 R15: ffff88041e003cc0 Nov 04 10:03:10 lucy-001 kernel: FS: 00007f346dbfd700(0000) GS:ffff88042ea80000(0000) knlGS:0000000000000000 Nov 04 10:03:10 lucy-001 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Nov 04 10:03:10 lucy-001 kernel: CR2: 00007f342baf3000 CR3: 00000003a6d92000 CR4: 00000000001406e0 Nov 04 10:03:10 lucy-001 kernel: Stack: Nov 04 10:03:10 lucy-001 kernel: ffffffffa1363397 ffff88041b8c3d80 ffff8803d6ebab40 0000000000000001 Nov 04 10:03:10 lucy-001 kernel: ffff880419c28a04 0000000000000001 ffff8803e160bd18 ffffffffa1363397 Nov 04 10:03:10 lucy-001 kernel: 00000000ffffff10 ffff8803e160bd30 ffffffffa13f3bce ffff88041a14c043 Nov 04 10:03:10 lucy-001 kernel: Call Trace: Nov 04 10:03:10 lucy-001 kernel: [<ffffffffa1363397>] ? selinux_sb_show_options+0xf7/0x4d0 Nov 04 10:03:10 lucy-001 kernel: [<ffffffffa1363397>] selinux_sb_show_options+0xf7/0x4d0 Nov 04 10:03:10 lucy-001 kernel: [<ffffffffa13f3bce>] ? string_escape_mem+0xde/0x270 Nov 04 10:03:10 lucy-001 kernel: [<ffffffffa1357d9b>] security_sb_show_options+0x3b/0x50 Nov 04 10:03:10 lucy-001 kernel: [<ffffffffa1289e26>] show_sb_opts+0x56/0x60 Nov 04 10:03:10 lucy-001 kernel: [<ffffffffa128a389>] show_mountinfo+0x1c9/0x290 Nov 04 10:03:10 lucy-001 kernel: [<ffffffffa1267467>] m_show+0x17/0x20 Nov 04 10:03:10 lucy-001 kernel: [<ffffffffa126c68c>] seq_read+0xec/0x390 Nov 04 10:03:10 lucy-001 kernel: [<ffffffffa1246647>] __vfs_read+0x37/0x150 Nov 04 10:03:10 lucy-001 kernel: [<ffffffffa13588e0>] ? security_file_permission+0xa0/0xc0 Nov 04 10:03:10 lucy-001 kernel: [<ffffffffa12477d6>] vfs_read+0x96/0x130 Nov 04 10:03:10 lucy-001 kernel: [<ffffffffa1248cb5>] SyS_read+0x55/0xc0 Nov 04 10:03:10 lucy-001 kernel: [<ffffffffa17ec5b2>] entry_SYSCALL_64_fastpath+0x1a/0xa4 Nov 04 10:03:10 lucy-001 kernel: Code: 49 83 78 10 00 4d 8b 10 0f 84 23 01 00 00 4d 85 d2 0f 84 1a 01 00 00 49 63 47 20 49 8b 3f 4c 01 d0 40 f6 c7 0f 0f 85 6f 01 00 00 <48> 8b 18 48 8d 4a 01 4c 89 d0 65 48 0f c7 0f 0f 94 c0 84 c0 74 Nov 04 10:03:10 lucy-001 kernel: RIP [<ffffffffa1220bc4>] __kmalloc+0xa4/0x220 Nov 04 10:03:10 lucy-001 kernel: RSP <ffff8803e160bc78> Nov 04 10:03:10 lucy-001 kernel: ---[ end trace 10c0da5aa16f3639 ]--- These kmalloc faults are showing any pattern that I can see. Linux lucy-001 4.8.4-200.fc24.x86_64 #1 SMP Tue Oct 25 13:06:04 UTC 2016 x86_64 x86_64 x86_64 GNU/Linux *********** MASS BUG UPDATE ************** We apologize for the inconvenience. There are a large number of bugs to go through and several of them have gone stale. Due to this, we are doing a mass bug update across all of the Fedora 24 kernel bugs. Fedora 25 has now been rebased to 4.10.9-100.fc24. Please test this kernel update (or newer) and let us know if you issue has been resolved or if it is still present with the newer kernel. If you have moved on to Fedora 26, and are still experiencing this issue, please change the version to Fedora 26. If you experience different issues, please open a new bug report for those. *********** MASS BUG UPDATE ************** This bug is being closed with INSUFFICIENT_DATA as there has not been a response in 2 weeks. If you are still experiencing this issue, please reopen and attach the relevant data from the latest kernel you are running and any data that might have been requested previously. |