NetBSD-Bugs archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
kern/54800: pool memory corruption
>Number: 54800
>Category: kern
>Synopsis: pool memory corruption
>Confidential: no
>Severity: critical
>Priority: high
>Responsible: kern-bug-people
>State: open
>Class: sw-bug
>Submitter-Id: net
>Arrival-Date: Thu Dec 26 09:05:00 +0000 2019
>Originator: Martin Husemann
>Release: NetBSD 9.99.30
>Organization:
The NetBSD Foundation, Inc.
>Environment:
System: NetBSD whoever-brings-the-night.aprisoft.de 9.99.17 NetBSD 9.99.17 (WHOEVER) #320: Wed Nov 20 14:36:21 CET 2019 martin%seven-days-to-the-wolves.aprisoft.de@localhost:/work/src/sys/arch/sparc64/compile/WHOEVER sparc64
Architecture: sparc64
Machine: sparc64
>Description:
Hidden in the log of the currently failing qemu / anita sparc64 tesst
runs you can find this gem:
[ 422.4170018] pool_redzone_check: 0x1257a0c20: 0x00 != 0x66
[ 422.4170018] pool_redzone_check: 0x1257a0c21: 0x00 != 0x05
If I read that correctly, a single 16bit halfword supposed to be 0x0f66
has been overwritten with 0.
Side question: why is that not worth a panic?
>How-To-Repeat:
See
http://releng.netbsd.org/b5reports/sparc64/2019/2019.12.25.15.56.35/install.log
>Fix:
n/a
Home |
Main Index |
Thread Index |
Old Index