Bug 699229 - [abrt] kernel: BUG: Bad page state in process aclocal pfn:372dc: TAINTED Bad Page
Summary: [abrt] kernel: BUG: Bad page state in process aclocal pfn:372dc: TAINTED Bad...
Keywords:
Status: CLOSED DUPLICATE of bug 699182
Alias: None
Product: Fedora
Classification: Fedora
Component: kernel
Version: rawhide
Hardware: i686
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Kernel Maintainer List
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:5003dae43630a13c887497f3cda...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-04-24 12:21 UTC by STEVEN WARD
Modified: 2011-06-27 16:55 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-06-27 16:55:12 UTC
Type: ---


Attachments (Terms of Use)
File: backtrace (810 bytes, text/plain)
2011-04-24 12:21 UTC, STEVEN WARD
no flags Details

Description STEVEN WARD 2011-04-24 12:21:42 UTC
abrt version: 2.0.1
cmdline: ro root=UUID=3df3bf2e-a803-4c5e-ba84-bee82d1ef5ed rd_NO_LUKS rd_NO_LVM rd_NO_MD rd_NO_DM LANG=en_US.UTF-8 SYSFONT=latarcyrheb-sun16 KEYTABLE=uk rhgb quiet
component: kernel
reported_to: kerneloops: URL=http://submit.kerneloops.org/submitoops.php
kernel_tainted: 32
kernel: 2.6.39-0.rc4.git2.0.fc16.i686
reason: BUG: Bad page state in process aclocal  pfn:372dc
package: kernel
architecture: i686
os_release: Fedora release 16 (Rawhide)
time: 1303646452

event_log
-----
2011-04-24-10:22:08> Submitting oops report to http://submit.kerneloops.org/submitoops.php
2011-04-24-10:22:09  Kernel oops report was uploaded

backtrace
-----
BUG: Bad page state in process aclocal  pfn:372dc
page:f5811b80 count:0 mapcount:-256 mapping:  (null) index:0x9b69
page flags: 0x80000000()
Pid: 5496, comm: aclocal Not tainted 2.6.39-0.rc4.git2.0.fc16.i686 #1
Call Trace:
 [<c04beaa9>] bad_page+0xca/0xe1
 [<c04bf618>] get_page_from_freelist+0x2e0/0x3c7
 [<c04bf99d>] __alloc_pages_nodemask+0x168/0x708
 [<c046716f>] ? lock_acquired+0x1de/0x1e6
 [<c04ee502>] ? lookup_page_cgroup_used+0xd/0x20
 [<c081ecaf>] ? _cond_resched+0xd/0x21
 [<c04d9da7>] ? anon_vma_prepare+0x29/0x100
 [<c04d2e5e>] handle_pte_fault+0x146/0x6f5
 [<c04d3577>] handle_mm_fault+0x16a/0x176
 [<c0823fa1>] do_page_fault+0x32d/0x344
 [<c04fd6cc>] ? path_put+0x1a/0x1d
 [<c0486476>] ? audit_syscall_exit+0xff/0x114
 [<c0823c74>] ? spurious_fault+0xa9/0xa9
 [<c0821a64>] error_code+0x6c/0x74

Comment 1 STEVEN WARD 2011-04-24 12:21:45 UTC
Created attachment 494517 [details]
File: backtrace

Comment 2 Dave Jones 2011-06-27 16:55:12 UTC
different process, but likely the same underlying problem.

*** This bug has been marked as a duplicate of bug 699182 ***


Note You need to log in before you can comment on or make changes to this bug.