| Summary: | [abrt] kernel: [679635.081940] BUG: Bad page state in process baobab pfn:12715b: TAINTED P----B | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | joshua |
| Component: | kernel | Assignee: | Kernel Maintainer List <kernel-maint> |
| Status: | CLOSED INSUFFICIENT_DATA | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | unspecified | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 15 | CC: | gansalmon, itamar, jonathan, kernel-maint, madhu.chinakonda |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | x86_64 | ||
| OS: | Unspecified | ||
| Whiteboard: | abrt_hash:e0e611ad311c1e12155e86928c6ddcfd98e7f861 | ||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2011-11-29 19:53:02 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
|
Description
joshua
2011-10-24 18:54:40 UTC
This coincides with this, not sure if it is related:
Raw Audit Messages
type=AVC msg=audit(1319482070.930:685): avc: denied { write } for pid=21425 comm="paster" name="etc" dev=dm-2 ino=1019341 scontext=system_u:system_r:piranha_web_t:s0 tcontext=system_u:object_r:piranha_web_conf_t:s0 tclass=dir
type=SYSCALL msg=audit(1319482070.930:685): arch=x86_64 syscall=open success=no exit=EACCES a0=22cb0b0 a1=241 a2=1b6 a3=9 items=0 ppid=21404 pid=21425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=paster exe=/usr/bin/python subj=system_u:system_r:piranha_web_t:s0 key=(null)
Hash: paster,piranha_web_t,piranha_web_conf_t,dir,write
unless you can reproduce this without the proprietary module, there's not much we can do with this. What proprietary module? The only thing that I think I have would be kmod-wl for the Broadcom wifi NIC. $ rpm -qa | grep kmod kmod-wl-5.60.48.36-2.fc15.9.x86_64 kmod-wl-2.6.40.6-0.fc15.x86_64-5.60.48.36-2.fc15.9.x86_64 I'm confused as kmod-wl doesn't seem to be related to this kernel dump. hfsplus seem to be the root of this problem, not kmod-wl :[679635.081949] page flags: 0x40000000000004(referenced) Something has set that high bit, which is why the kernel is freaking out. It looks like memory corruption of some kind. That hfsplus blew up may just be a side-effect, that that was the module that owned the memory those page-tables pointed to. Which is why we want to rule out the modules we don't ship. |