Running:
FreeBSD g1-252.catwhisker.org 11.1-STABLE FreeBSD 11.1-STABLE #484  
r326952M/326974:1101506: Tue Dec 19 03:58:25 PST 2017     
r...@g1-252.catwhisker.org:/common/S1/obj/usr/src/sys/CANARY  amd64

(but I also noticed it in passing yesterday, running @r326928):

ipfw pipe show generates:
Dec 19 13:08:38 g1-252 kernel: REDZONE: Buffer overflow detected. 16 bytes 
corrupted after 0xfffff801ab736f48 (328 bytes allocated).
Dec 19 13:08:38 g1-252 kernel: Allocation backtrace:
Dec 19 13:08:38 g1-252 kernel: #0 0xffffffff80d49299 at redzone_setup+0xe9
Dec 19 13:08:38 g1-252 kernel: #1 0xffffffff80a1175d at malloc+0x22d
Dec 19 13:08:38 g1-252 kernel: #2 0xffffffff80c95e07 at dummynet_get+0x337
Dec 19 13:08:38 g1-252 kernel: #3 0xffffffff80ba4102 at rip_ctloutput+0x102
Dec 19 13:08:38 g1-252 kernel: #4 0xffffffff80ac2d9d at sogetopt+0xcd
Dec 19 13:08:38 g1-252 kernel: #5 0xffffffff80ac756b at kern_getsockopt+0xdb
Dec 19 13:08:38 g1-252 kernel: #6 0xffffffff80ac7462 at sys_getsockopt+0x52
Dec 19 13:08:38 g1-252 kernel: #7 0xffffffff80e3a66a at amd64_syscall+0xa6a
Dec 19 13:08:38 g1-252 kernel: #8 0xffffffff80e1cedb at Xfast_syscall+0xfb
Dec 19 13:08:38 g1-252 kernel: Free backtrace:
Dec 19 13:08:38 g1-252 kernel: #0 0xffffffff80d49604 at redzone_check+0x304
Dec 19 13:08:38 g1-252 kernel: #1 0xffffffff80a117b6 at free+0x46
Dec 19 13:08:38 g1-252 kernel: #2 0xffffffff80c9623d at dummynet_get+0x76d
Dec 19 13:08:38 g1-252 kernel: #3 0xffffffff80ba4102 at rip_ctloutput+0x102
Dec 19 13:08:38 g1-252 kernel: #4 0xffffffff80ac2d9d at sogetopt+0xcd
Dec 19 13:08:38 g1-252 kernel: #5 0xffffffff80ac756b at kern_getsockopt+0xdb
Dec 19 13:08:38 g1-252 kernel: #6 0xffffffff80ac7462 at sys_getsockopt+0x52
Dec 19 13:08:38 g1-252 kernel: #7 0xffffffff80e3a66a at amd64_syscall+0xa6a
Dec 19 13:08:38 g1-252 kernel: #8 0xffffffff80e1cedb at Xfast_syscall+0xfb

Similarly; "ipfw sched show" yields:
Dec 19 13:08:54 g1-252 kernel: REDZONE: Buffer overflow detected. 16 bytes 
corrupted after 0xfffff80232e73748 (328 bytes allocated).
Dec 19 13:08:54 g1-252 kernel: Allocation backtrace:
Dec 19 13:08:54 g1-252 kernel: #0 0xffffffff80d49299 at redzone_setup+0xe9
Dec 19 13:08:54 g1-252 kernel: #1 0xffffffff80a1175d at malloc+0x22d
Dec 19 13:08:54 g1-252 kernel: #2 0xffffffff80c95e07 at dummynet_get+0x337
Dec 19 13:08:54 g1-252 kernel: #3 0xffffffff80ba4102 at rip_ctloutput+0x102
Dec 19 13:08:54 g1-252 kernel: #4 0xffffffff80ac2d9d at sogetopt+0xcd
Dec 19 13:08:54 g1-252 kernel: #5 0xffffffff80ac756b at kern_getsockopt+0xdb
Dec 19 13:08:54 g1-252 kernel: #6 0xffffffff80ac7462 at sys_getsockopt+0x52
Dec 19 13:08:54 g1-252 kernel: #7 0xffffffff80e3a66a at amd64_syscall+0xa6a
Dec 19 13:08:54 g1-252 kernel: #8 0xffffffff80e1cedb at Xfast_syscall+0xfb
Dec 19 13:08:54 g1-252 kernel: Free backtrace:
Dec 19 13:08:54 g1-252 kernel: #0 0xffffffff80d49604 at redzone_check+0x304
Dec 19 13:08:54 g1-252 kernel: #1 0xffffffff80a117b6 at free+0x46
Dec 19 13:08:54 g1-252 kernel: #2 0xffffffff80c9623d at dummynet_get+0x76d
Dec 19 13:08:54 g1-252 kernel: #3 0xffffffff80ba4102 at rip_ctloutput+0x102
Dec 19 13:08:54 g1-252 kernel: #4 0xffffffff80ac2d9d at sogetopt+0xcd
Dec 19 13:08:54 g1-252 kernel: #5 0xffffffff80ac756b at kern_getsockopt+0xdb
Dec 19 13:08:54 g1-252 kernel: #6 0xffffffff80ac7462 at sys_getsockopt+0x52
Dec 19 13:08:54 g1-252 kernel: #7 0xffffffff80e3a66a at amd64_syscall+0xa6a
Dec 19 13:08:54 g1-252 kernel: #8 0xffffffff80e1cedb at Xfast_syscall+0xfb


Yesterday was the first full day of running the laptop with FQ-CoDel
implemented, and I noticed that in the evening, things (such as
echoing charcaters in an xterm) would "pause" for a second or two,
fairly randomly.  I can't say that the above were associated with the
pauses, but they are associated with the commands -- this is trivially
reproducible (for me, anyway).

Times in the above logs are UTC.

Peace,
david
-- 
David H. Wolfskill                              da...@catwhisker.org
Given his track record so far, I presume that assertions from Trump are lies.

See http://www.catwhisker.org/~david/publickey.gpg for my public key.

Attachment: signature.asc
Description: PGP signature

Reply via email to