That bit pattern indicates an attempt to access storage that has been
freed and poisoned by the slab cache.
>>>EIP; c482424a <__module_parm_watchdog+4fd2/????> <=====
>Trace; c482777b <END_OF_CODE+8503/????>
>Trace; c482779d <END_OF_CODE+8525/????>
>Trace; c482190f <__module_parm_watchdog+2697/????>
>Trace; c4854c20 <END_OF_CODE+359a8/????>
At the time the oops occurred, the module symbols had already been
removed. You need to run ksymoops against ksyms and lsmod data from
*before* the rmmod. man insmod, see ksymoops assistance, in particular
directory /var/log/ksymoops. Run ksymoops against the symbols saved
after the module was loaded.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/