Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Mon, 24 Mar 2003 16:53:06 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Mon, 24 Mar 2003 16:53:06 -0500 Received: from deviant.impure.org.uk ([195.82.120.238]:19597 "EHLO deviant.impure.org.uk") by vger.kernel.org with ESMTP id ; Mon, 24 Mar 2003 16:53:05 -0500 Date: Mon, 24 Mar 2003 22:04:04 +0000 From: Dave Jones To: Linux Kernel Subject: conntrack related slab corruption in 2.5.65 Message-ID: <20030324220404.GB3034@suse.de> Mail-Followup-To: Dave Jones , Linux Kernel Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.4i Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2070 Lines: 44 Slab corruption: start=cf480a84, expend=cf480bb7, problemat=cf480aec Last user: [](destroy_conntrack+0xf8/0x159) Data: ********************************************************************************************************EC 0A 48 CF EC 0A 48 CF ***************************************************************************************************************************************************************************************************A5 Next: 71 F0 2C .3A D4 3E C0 71 F0 2C .******************** slab error in check_poison_obj(): cache `ip_conntrack': object was modified after freeing Call Trace: [] check_poison_obj+0x155/0x195 [] kmem_cache_alloc+0x139/0x177 [] init_conntrack+0x8d/0x44f [] init_conntrack+0x8d/0x44f [] ip_conntrack_in+0x20a/0x2bc [] udp_connect+0xa8/0x353 [] nf_iterate+0x5f/0x93 [] dst_output+0x0/0x2d [] nf_hook_slow+0xa9/0x205 [] dst_output+0x0/0x2d [] ip_queue_xmit+0x435/0x525 [] dst_output+0x0/0x2d [] __kfree_skb+0x89/0xfe [] check_poison_obj+0x3b/0x195 [] tcp_v4_send_check+0x4d/0xd8 [] tcp_transmit_skb+0x3b0/0x5b3 [] tcp_connect+0x3af/0x47b [] secure_tcp_sequence_number+0x82/0xa0 [] tcp_v4_connect+0x393/0x5db [] inet_stream_connect+0x264/0x3bc [] move_addr_to_kernel+0x6b/0x6f [] sys_connect+0x78/0x99 [] sock_destroy_inode+0x1d/0x21 [] sock_destroy_inode+0x1d/0x21 [] destroy_inode+0x36/0x50 [] iput+0x63/0x7c [] dput+0x24/0x333 [] sys_socketcall+0xb2/0x262 [] filp_close+0xe9/0x12d [] sys_close+0x97/0xdf [] syscall_call+0x7/0xb - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/