Bug 742192

Summary: [abrt] kernel: BUG: Bad page state in process sd.exec pfn:1a31ab: TAINTED P----B
Product: [Fedora] Fedora Reporter: edo <edosurina>
Component: kernelAssignee: Kernel Maintainer List <kernel-maint>
Status: CLOSED CANTFIX QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 15CC: gansalmon, itamar, jonathan, kernel-maint, madhu.chinakonda
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Unspecified   
Whiteboard: abrt_hash:c01334c9919008b12728afe801fa4c4f5c96f84d
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-09-29 11:08:40 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description edo 2011-09-29 10:58:27 UTC
abrt version: 2.0.3
architecture:   x86_64
cmdline:        ro root=/dev/mapper/vg_localhostnew-lv_root rd_LVM_LV=vg_localhostnew/lv_root rd_LVM_LV=vg_localhostnew/lv_swap rd_NO_LUKS rd_NO_MD rd_NO_DM LANG=sk_SK.UTF-8 SYSFONT=latarcyrheb-sun16 KEYTABLE=sk-qwerty rhgb quiet vga=792 nouveau.modeset=0 rdblacklist=nouveau acpi_osi="Linux"
component:      kernel
kernel:         2.6.40.4-5.fc15.x86_64
kernel_tainted: 33
os_release:     Fedora release 15 (Lovelock)
package:        kernel
reason:         BUG: Bad page state in process sd.exec  pfn:1a31ab
time:           Fri Sep 16 16:29:19 2011

backtrace:
:BUG: Bad page state in process sd.exec  pfn:1a31ab
:page:ffffea0005badd68 count:0 mapcount:33554432 mapping:          (null) index:0x1951
:page flags: 0x40000000080008(uptodate|swapbacked)
:Pid: 957, comm: sd.exec Tainted: P            2.6.40.4-5.fc15.x86_64 #1
:Call Trace:
: [<ffffffff810e145a>] ? dump_page+0xbe/0xc3
: [<ffffffff810e154f>] bad_page+0xf0/0x106
: [<ffffffff810e1b09>] free_pages_prepare+0x95/0xe3
: [<ffffffff810e1c81>] free_hot_cold_page+0x35/0x151
: [<ffffffff81123540>] ? lookup_page_cgroup+0x36/0x4c
: [<ffffffff810e1f65>] __pagevec_free+0x56/0x7a
: [<ffffffff810e5536>] release_pages+0x175/0x187
: [<ffffffff81032442>] ? ___pud_free_tlb+0x4e/0x53
: [<ffffffff810f7479>] ? free_pgd_range+0x2bf/0x398
: [<ffffffff81106751>] free_pages_and_swap_cache+0x52/0x6c
: [<ffffffff810f6fe2>] tlb_flush_mmu+0x46/0x65
: [<ffffffff810f7015>] tlb_finish_mmu+0x14/0x39
: [<ffffffff810fe0e4>] exit_mmap+0xd8/0x100
: [<ffffffff810528b1>] mmput+0x7b/0xe9
: [<ffffffff8112c564>] flush_old_exec+0x4b1/0x59d
: [<ffffffff81165315>] load_elf_binary+0x2dc/0x175f
: [<ffffffff814880e4>] ? _raw_read_lock+0xe/0x10
: [<ffffffff81162e68>] ? load_misc_binary+0x79/0x316
: [<ffffffff8120cb8c>] ? ima_must_measure+0x14/0x1e
: [<ffffffff8120c5a3>] ? process_measurement+0x4f/0xc6
: [<ffffffff810e56d2>] ? put_page+0x23/0x33
: [<ffffffff8112bf05>] search_binary_handler+0xb3/0x246
: [<ffffffff81165039>] ? load_elf_library+0x22f/0x22f
: [<ffffffff8112cc93>] do_execve_common+0x192/0x289
: [<ffffffff8112cdcd>] do_execve+0x43/0x45
: [<ffffffff81010222>] sys_execve+0x43/0x5a
: [<ffffffff8148ec9c>] stub_execve+0x6c/0xc0

comment:
:start PC
:crash

kernel_tainted_long:
:Proprietary module has been loaded.
:System has hit bad_page.

Comment 1 Josh Boyer 2011-09-29 11:08:40 UTC
If you can recreate this without the nvidia module loaded, please reopen.