Bug 699229

Summary: [abrt] kernel: BUG: Bad page state in process aclocal pfn:372dc: TAINTED Bad Page
Product: [Fedora] Fedora Reporter: STEVEN WARD <stevenward666>
Component: kernelAssignee: Kernel Maintainer List <kernel-maint>
Status: CLOSED DUPLICATE QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: rawhideCC: gansalmon, itamar, jonathan, kernel-maint, madhu.chinakonda
Target Milestone: ---   
Target Release: ---   
Hardware: i686   
OS: Unspecified   
Whiteboard: abrt_hash:5003dae43630a13c887497f3cdaa0e14b7767bba
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-06-27 16:55:12 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Attachments:
Description Flags
File: backtrace none

Description STEVEN WARD 2011-04-24 12:21:42 UTC
abrt version: 2.0.1
cmdline: ro root=UUID=3df3bf2e-a803-4c5e-ba84-bee82d1ef5ed rd_NO_LUKS rd_NO_LVM rd_NO_MD rd_NO_DM LANG=en_US.UTF-8 SYSFONT=latarcyrheb-sun16 KEYTABLE=uk rhgb quiet
component: kernel
reported_to: kerneloops: URL=http://submit.kerneloops.org/submitoops.php
kernel_tainted: 32
kernel: 2.6.39-0.rc4.git2.0.fc16.i686
reason: BUG: Bad page state in process aclocal  pfn:372dc
package: kernel
architecture: i686
os_release: Fedora release 16 (Rawhide)
time: 1303646452

event_log
-----
2011-04-24-10:22:08> Submitting oops report to http://submit.kerneloops.org/submitoops.php
2011-04-24-10:22:09  Kernel oops report was uploaded

backtrace
-----
BUG: Bad page state in process aclocal  pfn:372dc
page:f5811b80 count:0 mapcount:-256 mapping:  (null) index:0x9b69
page flags: 0x80000000()
Pid: 5496, comm: aclocal Not tainted 2.6.39-0.rc4.git2.0.fc16.i686 #1
Call Trace:
 [<c04beaa9>] bad_page+0xca/0xe1
 [<c04bf618>] get_page_from_freelist+0x2e0/0x3c7
 [<c04bf99d>] __alloc_pages_nodemask+0x168/0x708
 [<c046716f>] ? lock_acquired+0x1de/0x1e6
 [<c04ee502>] ? lookup_page_cgroup_used+0xd/0x20
 [<c081ecaf>] ? _cond_resched+0xd/0x21
 [<c04d9da7>] ? anon_vma_prepare+0x29/0x100
 [<c04d2e5e>] handle_pte_fault+0x146/0x6f5
 [<c04d3577>] handle_mm_fault+0x16a/0x176
 [<c0823fa1>] do_page_fault+0x32d/0x344
 [<c04fd6cc>] ? path_put+0x1a/0x1d
 [<c0486476>] ? audit_syscall_exit+0xff/0x114
 [<c0823c74>] ? spurious_fault+0xa9/0xa9
 [<c0821a64>] error_code+0x6c/0x74

Comment 1 STEVEN WARD 2011-04-24 12:21:45 UTC
Created attachment 494517 [details]
File: backtrace

Comment 2 Dave Jones 2011-06-27 16:55:12 UTC
different process, but likely the same underlying problem.

*** This bug has been marked as a duplicate of bug 699182 ***