Re: Oops with 2.6.29.1 (slab_get_obj,free_block,journal_write_metadata_buffer)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 1/7/07, Sebastian Kärgel <[email protected]> wrote:
BUG: unable to handle kernel paging request at virtual address 1b1ca570
 printing eip:
c014c3b1
*pde = 00000000
Oops: 0000 [#1]
Modules linked in:
CPU:    0
EIP:    0060:[<c014c3b1>]    Not tainted VLI
EFLAGS: 00010807   (2.6.19.1 #1)
EIP is at slab_get_obj+0x14/0x1f
eax: 55555544   ebx: 00000017   ecx: 55555555   edx: c5c75000
esi: c5c75000   edi: c18ddc60   ebp: c18d7e00   esp: e54bfc58
ds: 007b   es: 007b   ss: 0068
Process shred (pid: 3393, ti=e54be000 task=f77fda70 task.ti=e54be000)
Stack: c014c62b c18dfba0 c5c75000 00000000 00000024 00000246 00000050 c18dfba0
       00000001 c014c8c3 c18dfba0 00000050 f77cb8f4 00000400 00000400 c016dd60
       c18dfba0 00000050 f77cb8f4 c016b66c 00000050 c1309d60 00000800 c1309d60
Call Trace:
 [<c014c62b>] cache_alloc_refill+0xc8/0x17d
 [<c014c8c3>] kmem_cache_alloc+0x55/0x61
 [<c016dd60>] alloc_buffer_head+0x18/0x2f
 [<c016b66c>] alloc_page_buffers+0x26/0xa9
 [<c016be86>] create_empty_buffers+0x25/0x7c
 [<c016c2ca>] __block_prepare_write+0x95/0x445
 [<c01386c8>] __alloc_pages+0x72/0x2f0
 [<c016ce5a>] block_prepare_write+0x31/0x3e
 [<c016f289>] blkdev_get_block+0x0/0x3e
 [<c01362d8>] generic_file_buffered_write+0x231/0x61e
 [<c016f289>] blkdev_get_block+0x0/0x3e
 [<c01036f3>] apic_timer_interrupt+0x1f/0x24
 [<c011b2d8>] current_fs_time+0x47/0x52
 [<c016070f>] file_update_time+0x37/0x9f
 [<c0136bbd>] __generic_file_aio_write_nolock+0x4f8/0x526
 [<c02f47d9>] ide_dma_exec_cmd+0x30/0x34
 [<c02f480f>] ide_dma_start+0x32/0x40
 [<c02f6354>] __ide_do_rw_disk+0x3ba/0x49e
 [<c0232407>] as_move_to_dispatch+0xff/0x124
 [<c0136c43>] generic_file_aio_write_nolock+0x58/0xb1
 [<c014efe9>] do_sync_write+0xdd/0x11a
 [<c0127fb2>] autoremove_wake_function+0x0/0x4b
 [<c0133a64>] handle_edge_irq+0xcd/0xee
 [<c010513c>] do_IRQ+0x70/0x83
 [<c0133a64>] handle_edge_irq+0xcd/0xee
 [<c014f0c6>] vfs_write+0xa0/0x16b
 [<c014f24d>] sys_write+0x4b/0x71
 [<c0102d47>] syscall_call+0x7/0xb
 =======================
Code: 15 0f 0b 3e 0a d1 5e 44 c0 c3 a8 01 74 08 0f 0b 40 0a d1 5e 44 c0 c3 8b 54 24 08 8b 44 24 04 8b 4a 14 8b 40 10 ff 42 10 0f af c1 <8b> 4c 8a 1c 03 42 0c 89 4a 14 c3 8b 54 24 08 8b 4c 24 04 8b 44
EIP: [<c014c3b1>] slab_get_obj+0x14/0x1f SS:ESP 0068:e54bfc58

Looks like someone corrupted slab->free with 0x55555555. If possible,
try running with CONFIG_SLAB_DEBUG enabled to catch the offender.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

[Index of Archives]     [Kernel Newbies]     [Netfilter]     [Bugtraq]     [Photo]     [Stuff]     [Gimp]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Video 4 Linux]     [Linux for the blind]     [Linux Resources]
  Powered by Linux