Slab corruption/errors in 2.5.71-bk1

From: Martin Schlemmer (azarah@gentoo.org)
Date: Sun Jun 15 2003 - 17:20:46 EST


Hiya

Lot of these in the logs. I am sure there were others with the same
problem, but that was in rpc_depopulate. If more info needed, feel free
to ask.

Please just CC me, as subscribed only at work, and will only be back on
Tuesday.

------------------
Slab corruption: start=e13d0cdc, expend=e13d0cfb, problemat=e13d0cdc
Last user: [<c01b7cfa>](copy_semundo+0x94/0xe8)
Data: 02 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ***************A5
Next: A5 C2 0F 17 FA 7C 1B C0 A5 C2 0F 17 00 00 00 00 01 00 00 00 05 00
00 00 01 00 00 00 ****
slab error in check_poison_obj(): cache `size-32': object was modified
after freeing
Call Trace:
 [<c013f4c2>] check_poison_obj+0x14a/0x18a
 [<c0141059>] __kmalloc+0x155/0x188
 [<c017ea1b>] load_elf_binary+0x99b/0xb4a
 [<c017ea1b>] load_elf_binary+0x99b/0xb4a
 [<c0155dd0>] do_sync_read+0x8b/0xb7
 [<c013cc12>] buffered_rmqueue+0xed/0x19b
 [<c013cc12>] buffered_rmqueue+0xed/0x19b
 [<c013cd4b>] __alloc_pages+0x8b/0x2f8
 [<c013cd4b>] __alloc_pages+0x8b/0x2f8
 [<c0160a12>] copy_strings+0x203/0x241
 [<c017e080>] load_elf_binary+0x0/0xb4a
 [<c0161efa>] search_binary_handler+0x192/0x2d9
 [<c01621fc>] do_execve+0x1bb/0x22b
 [<c010928e>] sys_execve+0x42/0x7a
 [<c010aa55>] sysenter_past_esp+0x52/0x71

slab error in cache_alloc_debugcheck_after(): cache `size-32': memory
before object was overwritten
Call Trace:
 [<c0140fef>] __kmalloc+0xeb/0x188
 [<c017ea1b>] load_elf_binary+0x99b/0xb4a
 [<c017ea1b>] load_elf_binary+0x99b/0xb4a
 [<c0155dd0>] do_sync_read+0x8b/0xb7
 [<c013cc12>] buffered_rmqueue+0xed/0x19b
 [<c013cc12>] buffered_rmqueue+0xed/0x19b
 [<c013cd4b>] __alloc_pages+0x8b/0x2f8
 [<c013cd4b>] __alloc_pages+0x8b/0x2f8
 [<c0160a12>] copy_strings+0x203/0x241
 [<c017e080>] load_elf_binary+0x0/0xb4a
 [<c0161efa>] search_binary_handler+0x192/0x2d9
 [<c01621fc>] do_execve+0x1bb/0x22b
 [<c010928e>] sys_execve+0x42/0x7a
 [<c010aa55>] sysenter_past_esp+0x52/0x71

slab error in cache_alloc_debugcheck_after(): cache `size-32': memory
after object was overwritten
Call Trace:
 [<c0141017>] __kmalloc+0x113/0x188
 [<c017ea1b>] load_elf_binary+0x99b/0xb4a
 [<c017ea1b>] load_elf_binary+0x99b/0xb4a
 [<c0155dd0>] do_sync_read+0x8b/0xb7
 [<c013cc12>] buffered_rmqueue+0xed/0x19b
 [<c013cc12>] buffered_rmqueue+0xed/0x19b
 [<c013cd4b>] __alloc_pages+0x8b/0x2f8
 [<c013cd4b>] __alloc_pages+0x8b/0x2f8
 [<c0160a12>] copy_strings+0x203/0x241
 [<c017e080>] load_elf_binary+0x0/0xb4a
 [<c0161efa>] search_binary_handler+0x192/0x2d9
 [<c01621fc>] do_execve+0x1bb/0x22b
 [<c010928e>] sys_execve+0x42/0x7a
 [<c010aa55>] sysenter_past_esp+0x52/0x71

Regards,

-- 

Martin Schlemmer


- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Sun Jun 15 2003 - 22:00:43 EST