Bug 714837 - [abrt] kernel: WARNING: at kernel/watchdog.c:226 watchdog_overflow_callback+0x9b/0xa6(): TAINTED Warning Issued
Summary: [abrt] kernel: WARNING: at kernel/watchdog.c:226 watchdog_overflow_callback+0...
Keywords:
Status: CLOSED DUPLICATE of bug 714521
Alias: None
Product: Fedora
Classification: Fedora
Component: kernel
Version: 15
Hardware: x86_64
OS: Linux
unspecified
unspecified
Target Milestone: ---
Assignee: Kernel Maintainer List
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: abrt_hash:b0848e58c0a91918d213d170c84...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-06-21 02:28 UTC by staimeer
Modified: 2011-06-24 08:31 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-06-24 08:31:57 UTC
Type: ---


Attachments (Terms of Use)

Description staimeer 2011-06-21 02:28:09 UTC
abrt version: 2.0.1
architecture:   x86_64
cmdline:        ro root=UUID=6aa3d5f1-78a2-4a6a-8271-92c9c0d6c55b rd_NO_LUKS rd_NO_LVM rd_NO_MD rd_NO_DM LANG=pt_BR.UTF-8 SYSFONT=latarcyrheb-sun16 KEYTABLE=br-abnt2 rhgb quiet
component:      kernel
kernel:         2.6.38.8-32.fc15.x86_64
kernel_tainted: 512
os_release:     Fedora release 15 (Lovelock)
package:        kernel
reason:         [100715.416960] WARNING: at kernel/watchdog.c:226 watchdog_overflow_callback+0x9b/0xa6()
reported_to:    kerneloops: URL=http://submit.kerneloops.org/submitoops.php
time:           Mon Jun 20 18:43:59 2011

backtrace:
:[100715.416960] WARNING: at kernel/watchdog.c:226 watchdog_overflow_callback+0x9b/0xa6()
:[100715.416960] Hardware name: System Product Name
:[100715.416960] Watchdog detected hard LOCKUP on cpu 0
:[100715.416960] Modules linked in: tcp_lp fuse tpm_infineon sunrpc cpufreq_ondemand powernow_k8 freq_table mperf snd_hda_codec_realtek snd_hda_intel ppdev snd_hda_codec snd_hwdep snd_seq snd_seq_device microcode edac_core r8169 snd_pcm snd_timer sp5100_tco snd edac_mce_amd soundcore i2c_piix4 snd_page_alloc k8temp mii serio_raw asus_atk0110 parport_pc parport ipv6 btrfs zlib_deflate libcrc32c ata_generic pata_acpi pata_atiixp nouveau ttm drm_kms_helper drm i2c_algo_bit i2c_core video [last unloaded: scsi_wait_scan]
:[100715.416960] Pid: 0, comm: swapper Tainted: G        W   2.6.38.8-32.fc15.x86_64 #1
:[100715.416960] Call Trace:
:[100715.416960]  <NMI>  [<ffffffff8105511a>] warn_slowpath_common+0x83/0x9b
:[100715.416960]  [<ffffffff810551d5>] warn_slowpath_fmt+0x46/0x48
:[100715.416960]  [<ffffffff810ac2e3>] watchdog_overflow_callback+0x9b/0xa6
:[100715.416960]  [<ffffffff810d3ca1>] __perf_event_overflow+0x135/0x191
:[100715.416960]  [<ffffffff810162f2>] ? paravirt_write_msr+0xf/0x13
:[100715.416960]  [<ffffffff810d42fa>] perf_event_overflow+0x14/0x16
:[100715.416960]  [<ffffffff8101836f>] x86_pmu_handle_irq+0xaf/0xea
:[100715.416960]  [<ffffffff814772e0>] perf_event_nmi_handler+0x67/0xb3
:[100715.416960]  [<ffffffff81478f89>] notifier_call_chain+0x37/0x63
:[100715.416960]  [<ffffffff81478fe1>] atomic_notifier_call_chain+0x18/0x1a
:[100715.416960]  [<ffffffff81479011>] notify_die+0x2e/0x30
:[100715.416960]  [<ffffffff81476774>] do_nmi+0x6d/0x217
:[100715.416960]  [<ffffffff81476490>] nmi+0x20/0x30
:[100715.416960]  [<ffffffff8102a145>] ? native_safe_halt+0xb/0xd
:[100715.416960]  <<EOE>>  [<ffffffff81010d36>] default_idle+0x4e/0x86
:[100715.416960]  [<ffffffff81010e31>] c1e_idle+0xc3/0xe4
:[100715.416960]  [<ffffffff81008321>] cpu_idle+0xa5/0xdf
:[100715.416960]  [<ffffffff81454cde>] rest_init+0x72/0x74
:[100715.416960]  [<ffffffff81b58c2f>] start_kernel+0x3f2/0x3fe
:[100715.416960]  [<ffffffff81b582c4>] x86_64_start_reservations+0xaf/0xb3
:[100715.416960]  [<ffffffff81b58140>] ? early_idt_handler+0x0/0x71
:[100715.416960]  [<ffffffff81b583cf>] x86_64_start_kernel+0x107/0x116

event_log:
:2011-06-20-23:27:03> Submitting oops report to http://submit.kerneloops.org/submitoops.php
:2011-06-20-23:28:06  Kernel oops report was uploaded

Comment 1 Chuck Ebbert 2011-06-24 08:31:57 UTC

*** This bug has been marked as a duplicate of bug 714521 ***


Note You need to log in before you can comment on or make changes to this bug.