From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from shark.he.net ([66.160.160.2]) by xenotime.net for ; Wed, 23 Nov 2005 15:36:52 -0800 Date: Wed, 23 Nov 2005 15:36:51 -0800 (PST) From: "Randy.Dunlap" Subject: RE: Kernel BUG at mm/rmap.c:491 In-Reply-To: <200511232333.jANNX9g23967@unix-os.sc.intel.com> Message-ID: References: <200511232333.jANNX9g23967@unix-os.sc.intel.com> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-linux-mm@kvack.org Return-Path: To: "Chen, Kenneth W" Cc: 'Con Kolivas' , linux-mm@kvack.org, linux-kernel@vger.kernel.org List-ID: On Wed, 23 Nov 2005, Chen, Kenneth W wrote: > Con Kolivas wrote on Wednesday, November 23, 2005 3:24 PM > > Chen, Kenneth W writes: > > > > > Has people seen this BUG_ON before? On 2.6.15-rc2, x86-64. > > > > > > Pid: 16500, comm: cc1 Tainted: G B 2.6.15-rc2 #3 > > > > > > Pid: 16651, comm: sh Tainted: G B 2.6.15-rc2 #3 > > > > ^^^^^^^^^^ > > > > Please try to reproduce it without proprietary binary modules linked in. > > > ???, I'm not using any modules at all. > > [albat]$ /sbin/lsmod > Module Size Used by > [albat]$ > > > Also, isn't it 'P' indicate proprietary module, not 'G'? Yes. It's the 'B' that is tainting in this case: TAINT_BAD_PAGE is set. > line 159: kernel/panic.c: > > snprintf(buf, sizeof(buf), "Tainted: %c%c%c%c%c%c", > tainted & TAINT_PROPRIETARY_MODULE ? 'P' : 'G', -- ~Randy -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org