Bug 742192 - [abrt] kernel: BUG: Bad page state in process sd.exec pfn:1a31ab: TAINTED P----B
Summary: [abrt] kernel: BUG: Bad page state in process sd.exec pfn:1a31ab: TAINTED P-...
Keywords:
Status: CLOSED CANTFIX
Alias: None
Product: Fedora
Classification: Fedora
Component: kernel
Version: 15
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Kernel Maintainer List
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:c01334c9919008b12728afe801f...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-09-29 10:58 UTC by edo
Modified: 2011-09-29 11:08 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-09-29 11:08:40 UTC
Type: ---


Attachments (Terms of Use)

Description edo 2011-09-29 10:58:27 UTC
abrt version: 2.0.3
architecture:   x86_64
cmdline:        ro root=/dev/mapper/vg_localhostnew-lv_root rd_LVM_LV=vg_localhostnew/lv_root rd_LVM_LV=vg_localhostnew/lv_swap rd_NO_LUKS rd_NO_MD rd_NO_DM LANG=sk_SK.UTF-8 SYSFONT=latarcyrheb-sun16 KEYTABLE=sk-qwerty rhgb quiet vga=792 nouveau.modeset=0 rdblacklist=nouveau acpi_osi="Linux"
component:      kernel
kernel:         2.6.40.4-5.fc15.x86_64
kernel_tainted: 33
os_release:     Fedora release 15 (Lovelock)
package:        kernel
reason:         BUG: Bad page state in process sd.exec  pfn:1a31ab
time:           Fri Sep 16 16:29:19 2011

backtrace:
:BUG: Bad page state in process sd.exec  pfn:1a31ab
:page:ffffea0005badd68 count:0 mapcount:33554432 mapping:          (null) index:0x1951
:page flags: 0x40000000080008(uptodate|swapbacked)
:Pid: 957, comm: sd.exec Tainted: P            2.6.40.4-5.fc15.x86_64 #1
:Call Trace:
: [<ffffffff810e145a>] ? dump_page+0xbe/0xc3
: [<ffffffff810e154f>] bad_page+0xf0/0x106
: [<ffffffff810e1b09>] free_pages_prepare+0x95/0xe3
: [<ffffffff810e1c81>] free_hot_cold_page+0x35/0x151
: [<ffffffff81123540>] ? lookup_page_cgroup+0x36/0x4c
: [<ffffffff810e1f65>] __pagevec_free+0x56/0x7a
: [<ffffffff810e5536>] release_pages+0x175/0x187
: [<ffffffff81032442>] ? ___pud_free_tlb+0x4e/0x53
: [<ffffffff810f7479>] ? free_pgd_range+0x2bf/0x398
: [<ffffffff81106751>] free_pages_and_swap_cache+0x52/0x6c
: [<ffffffff810f6fe2>] tlb_flush_mmu+0x46/0x65
: [<ffffffff810f7015>] tlb_finish_mmu+0x14/0x39
: [<ffffffff810fe0e4>] exit_mmap+0xd8/0x100
: [<ffffffff810528b1>] mmput+0x7b/0xe9
: [<ffffffff8112c564>] flush_old_exec+0x4b1/0x59d
: [<ffffffff81165315>] load_elf_binary+0x2dc/0x175f
: [<ffffffff814880e4>] ? _raw_read_lock+0xe/0x10
: [<ffffffff81162e68>] ? load_misc_binary+0x79/0x316
: [<ffffffff8120cb8c>] ? ima_must_measure+0x14/0x1e
: [<ffffffff8120c5a3>] ? process_measurement+0x4f/0xc6
: [<ffffffff810e56d2>] ? put_page+0x23/0x33
: [<ffffffff8112bf05>] search_binary_handler+0xb3/0x246
: [<ffffffff81165039>] ? load_elf_library+0x22f/0x22f
: [<ffffffff8112cc93>] do_execve_common+0x192/0x289
: [<ffffffff8112cdcd>] do_execve+0x43/0x45
: [<ffffffff81010222>] sys_execve+0x43/0x5a
: [<ffffffff8148ec9c>] stub_execve+0x6c/0xc0

comment:
:start PC
:crash

kernel_tainted_long:
:Proprietary module has been loaded.
:System has hit bad_page.

Comment 1 Josh Boyer 2011-09-29 11:08:40 UTC
If you can recreate this without the nvidia module loaded, please reopen.


Note You need to log in before you can comment on or make changes to this bug.