NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

kern/54800: pool memory corruption

>Number:         54800
>Category:       kern
>Synopsis:       pool memory corruption
>Confidential:   no
>Severity:       critical
>Priority:       high
>Responsible:    kern-bug-people
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Thu Dec 26 09:05:00 +0000 2019
>Originator:     Martin Husemann
>Release:        NetBSD 9.99.30
The NetBSD Foundation, Inc.
System: NetBSD 9.99.17 NetBSD 9.99.17 (WHOEVER) #320: Wed Nov 20 14:36:21 CET 2019 sparc64
Architecture: sparc64
Machine: sparc64

Hidden in the log of the currently failing qemu / anita sparc64 tesst
runs you can find this gem:

[ 422.4170018] pool_redzone_check: 0x1257a0c20: 0x00 != 0x66
[ 422.4170018] pool_redzone_check: 0x1257a0c21: 0x00 != 0x05

If I read that correctly, a single 16bit halfword supposed to be 0x0f66
has been overwritten with 0.

Side question: why is that not worth a panic?




Home | Main Index | Thread Index | Old Index