Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751981AbWCFRpG (ORCPT ); Mon, 6 Mar 2006 12:45:06 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1751980AbWCFRpF (ORCPT ); Mon, 6 Mar 2006 12:45:05 -0500 Received: from smtp-2.llnl.gov ([128.115.3.82]:7809 "EHLO smtp-2.llnl.gov") by vger.kernel.org with ESMTP id S1751960AbWCFRpC (ORCPT ); Mon, 6 Mar 2006 12:45:02 -0500 From: Dave Peterson To: Dave Jones , Linux Kernel Subject: Re: edac slab corruption. Date: Mon, 6 Mar 2006 09:44:53 -0800 User-Agent: KMail/1.5.3 Cc: norsk5@xmission.com, dthompson@linuxnetworx.com References: <20060305074355.GA3151@redhat.com> In-Reply-To: <20060305074355.GA3151@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200603060944.53601.dsp@llnl.gov> Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1260 Lines: 31 On Saturday 04 March 2006 23:43, Dave Jones wrote: > rmmod e752x_edac edac_mc > Wait a few seconds... > > EDAC MC0: Removed device 0 for "e752x_edac" E7525: PCI 0000:00:00.0 > Slab corruption: start=ffff81003fc5a000, len=4096 > > Call Trace: {check_poison_obj+121} > {kobject_uevent+676} > {cache_alloc_debugcheck_after+48} > {kobject_uevent+676} > {__kmalloc_track_caller+301} > {__alloc_skb+97} {kobject_uevent+253} > {kobject_uevent+676} > {kobject_unregister+14} > {bus_remove_driver+126} > {driver_unregister+9} > {pci_unregister_driver+16} > {sys_delete_module+551} > {syscall_trace_enter+156} > {tracesys+209} 0f0: 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b > 6a 6b 6b 6b > > Dave Which version of the EDAC code was this observed with? - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/