Bug 834819
Summary: | Kernel 3.3.7-1.fc16.i686 | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | jd1008 |
Component: | kernel | Assignee: | Kernel Maintainer List <kernel-maint> |
Status: | CLOSED CANTFIX | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 16 | CC: | gansalmon, itamar, jforbes, jonathan, kernel-maint, madhu.chinakonda |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | vbox first=3.3.7 tested=3.4.2 | ||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2012-07-09 19:37:05 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
jd1008
2012-06-23 22:09:18 UTC
Your kernel is tainted with the B flag. That means something else produced a BUG before this. That would be the first thing someone would need to look at. However, you also have the vbox modules loaded. If you can recreate this without any of the vbox modules loaded, please let us know. Sorry, I am not familiar with how a kernel get's tainted by the B flag. How does that happen? I will try to reproduce by unloading the vbox modules in single user mode and will remount that hfs external drive and re-start tarring the external drive out to another drive and verifying the md5 sums. Does this reproduce with the 3.4 kernels currently shipping for F16? I have not tried to boot 3.4, but will do so soon and report back. I just got a kernel oops in 3.4.2-1 but it is very different from the kernel stack of this bug. abrt reported that this kernel is also tainted. How in tarnation does a kernel get tainted? /var/log/messages shows: Jun 29 09:06:21 localhost kernel: [356335.959866] BUG: Bad page state in process khugepaged pfn:3cf14 Jun 29 09:06:21 localhost kernel: [356335.959880] page:f6b9b280 count:0 mapcount:0 mapping: (null) index:0x1b9 Jun 29 09:06:21 localhost kernel: [356335.959887] page flags: 0x80000004(referenced) Jun 29 09:06:21 localhost kernel: [356335.959895] Modules linked in: lp rndis_host cdc_ether usbnet nls_utf8 hfsplus usb_storage ebtable_nat ebtables tun bridge stp llc target_core_mod rmd160 crypto_null camellia_generic lzo cast6 cast5 deflate zlib_deflat e cts gcm ccm serpent_sse2_i586 lrw serpent_generic xts gf128mul blowfish_generic blowfish_common twofish_generic twofish_i586 t wofish_common xcbc sha512_generic des_generic geode_aes ah6 ah4 esp6 esp4 xfrm4_mode_beet xfrm4_tunnel tunnel4 xfrm4_mode_tunnel xfrm4_mode_transport xfrm6_mode_transport xfrm6_mode_ro xfrm6_mode_beet xfrm6_mode_tunnel ipcomp ipcomp6 xfrm_ipcomp xfrm6_tunn el tunnel6 af_key lockd vboxpci(O) vboxnetadp(O) vboxnetflt(O) vboxdrv(O) xt_LOG ipt_MASQUERADE ip6t_REJECT nf_conntrack_ipv6 nf _defrag_ipv6 iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack xt_CHECKSUM ip6table_filter ip6_tables ip table_mangle arc4 fuse ath9k snd_intel8x0m snd_intel8x0 mac80211 snd_ac97_codec ath9k_common ath9k_hw ac97_bus snd_seq vfat snd_ seq_de Jun 29 09:06:21 localhost kernel: vice snd_pcm ath fat sunrpc snd_timer cfg80211 snd irda ppdev soundcore i2c_sis96x rfkill snd_ page_alloc k8temp parport_pc parport crc_ccitt serio_raw joydev ecryptfs sha256_generic encrypted_keys trusted tpm tpm_bios uinp ut binfmt_misc sata_sil ata_generic firewire_ohci pata_acpi firewire_core sis900 yenta_socket mii crc_itu_t video pata_sis radeo n ttm drm_kms_helper drm i2c_algo_bit i2c_core [last unloaded: scsi_wait_scan] Jun 29 09:06:21 localhost kernel: [356335.960139] Pid: 23, comm: khugepaged Tainted: G C O 3.4.2-1.fc16.i686 #1 Jun 29 09:06:21 localhost kernel: [356335.960146] Call Trace: Jun 29 09:06:21 localhost kernel: [356335.960163] [<c04ee4b7>] bad_page+0xa7/0xf0 Jun 29 09:06:21 localhost kernel: [356335.960173] [<c04ef66c>] get_page_from_freelist+0x46c/0x520 Jun 29 09:06:21 localhost kernel: [356335.960182] [<c04eed13>] ? free_pages_prepare+0x83/0x160 Jun 29 09:06:21 localhost kernel: [356335.960193] [<c04ef87c>] __alloc_pages_nodemask+0x15c/0x780 Jun 29 09:06:21 localhost kernel: [356335.960206] [<c052d527>] ? __mem_cgroup_uncharge_common+0xe7/0x2a0 Jun 29 09:06:21 localhost kernel: [356335.960215] [<c0527eb6>] khugepaged+0x186/0x10d0 Jun 29 09:06:21 localhost kernel: [356335.960229] [<c04554b0>] ? remove_wait_queue+0x40/0x40 Jun 29 09:06:21 localhost kernel: [356335.960237] [<c0527d30>] ? collect_mm_slot+0x80/0x80 Jun 29 09:06:21 localhost kernel: [356335.960246] [<c0454cd2>] kthread+0x72/0x80 Jun 29 09:06:21 localhost kernel: [356335.960256] [<c0454c60>] ? kthread_freezable_should_stop+0x60/0x60 Jun 29 09:06:21 localhost kernel: [356335.960267] [<c093ad3e>] kernel_thread_helper+0x6/0x10 Jun 29 09:06:21 localhost kernel: [356335.960272] Disabling lock debugging due to kernel taint Jun 29 09:06:22 localhost abrt-dump-oops[953]: abrt-dump-oops: Found oopses: 1 Jun 29 09:06:22 localhost abrt-dump-oops[953]: abrt-dump-oops: Creating dump directories Jun 29 09:06:22 localhost abrt-dump-oops: Reported 1 kernel oopses to Abrt Jun 29 09:06:22 localhost abrtd: Directory 'oops-2012-06-29-09:06:22-953-0' creation detected Jun 29 09:06:22 localhost abrtd: Can't open file '/var/spool/abrt/oops-2012-06-29-09:06:22-953-0/uid': No such file or directory Jun 29 09:06:23 localhost abrtd: Sending an email... Jun 29 09:06:23 localhost abrtd: Email was sent to: root@localhost Jun 29 09:06:23 localhost abrtd: New problem directory /var/spool/abrt/oops-2012-06-29-09:06:22-953-0, processing Jun 29 09:06:23 localhost abrtd: Can't open file '/var/spool/abrt/oops-2012-06-29-09:06:22-953-0/uid': No such file or directory This still looks like it's caused by the virtual box modules. Reopen if you can reproduce without them loaded. |