NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

kern/54800: pool memory corruption



>Number:         54800
>Category:       kern
>Synopsis:       pool memory corruption
>Confidential:   no
>Severity:       critical
>Priority:       high
>Responsible:    kern-bug-people
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Thu Dec 26 09:05:00 +0000 2019
>Originator:     Martin Husemann
>Release:        NetBSD 9.99.30
>Organization:
The NetBSD Foundation, Inc.
>Environment:
System: NetBSD whoever-brings-the-night.aprisoft.de 9.99.17 NetBSD 9.99.17 (WHOEVER) #320: Wed Nov 20 14:36:21 CET 2019 martin%seven-days-to-the-wolves.aprisoft.de@localhost:/work/src/sys/arch/sparc64/compile/WHOEVER sparc64
Architecture: sparc64
Machine: sparc64
>Description:

Hidden in the log of the currently failing qemu / anita sparc64 tesst
runs you can find this gem:

[ 422.4170018] pool_redzone_check: 0x1257a0c20: 0x00 != 0x66
[ 422.4170018] pool_redzone_check: 0x1257a0c21: 0x00 != 0x05

If I read that correctly, a single 16bit halfword supposed to be 0x0f66
has been overwritten with 0.

Side question: why is that not worth a panic?

>How-To-Repeat:

See
http://releng.netbsd.org/b5reports/sparc64/2019/2019.12.25.15.56.35/install.log

>Fix:
n/a



Home | Main Index | Thread Index | Old Index