Bug 864752 - [abrt]: kernel BUG at fs/jbd2/transaction.c:1976!: TAINTED G D
[abrt]: kernel BUG at fs/jbd2/transaction.c:1976!: TAINTED G D
Status: CLOSED INSUFFICIENT_DATA
Product: Fedora
Classification: Fedora
Component: kernel (Show other bugs)
17
x86_64 Unspecified
unspecified Severity unspecified
: ---
: ---
Assigned To: Kernel Maintainer List
Fedora Extras Quality Assurance
abrt_hash:8784c063e4a2ac62d8d93bf57fe...
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2012-10-09 23:10 EDT by dethbecomethii
Modified: 2013-01-02 08:24 EST (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-01-02 08:24:14 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description dethbecomethii 2012-10-09 23:10:07 EDT
Additional info:
libreport version: 2.0.14
abrt_version:   2.0.13
cmdline:        BOOT_IMAGE=/vmlinuz-3.5.4-2.fc17.x86_64 root=/dev/mapper/vg_joe-lv_root ro rd.md=0 rd.lvm.lv=vg_joe/lv_swap SYSFONT=True KEYTABLE=us rd.lvm.lv=vg_joe/lv_root rd.luks=0 LANG=en_US.UTF-8 rd.dm=0 rhgb quiet
kernel:         3.5.4-2.fc17.x86_64 #1 MSI MS-7681/P67A-GD65 (MS-7681

kernel_tainted_long:
:Proprietary module has not been loaded.
:Kernel has oopsed before

backtrace:
:kernel BUG at fs/jbd2/transaction.c:1976!
:invalid opcode: 0000 [#2] SMP 
:CPU 0 
:Modules linked in: fuse bnep bluetooth rfkill ip6t_REJECT nf_conntrack_ipv4 nf_conntrack_ipv6 nf_defrag_ipv6 nf_defrag_ipv4 xt_state nf_conntrack ip6table_filter ip6_tables snd_hda_codec_realtek snd_hda_intel snd_hda_codec snd_hwdep r8169 lpc_ich mfd_core mei snd_seq snd_seq_device mii i2c_i801 shpchp snd_pcm snd_page_alloc snd_timer snd soundcore serio_raw coretemp kvm_intel kvm microcode uinput crc32c_intel ghash_clmulni_intel firewire_ohci firewire_core crc_itu_t nouveau mxm_wmi wmi video i2c_algo_bit drm_kms_helper ttm drm i2c_core [last unloaded: scsi_wait_scan]
:Pid: 24002, comm: abrt-retrace-cl Tainted: G      D      3.5.4-2.fc17.x86_64 #1 MSI MS-7681/P67A-GD65 (MS-7681)
:RIP: 0010:[<ffffffff81249f4f>]  [<ffffffff81249f4f>] jbd2_journal_invalidatepage+0x30f/0x320
:RSP: 0018:ffff88037de23a88  EFLAGS: 00010206
:RAX: 0000000000080025 RBX: 0000000000001000 RCX: 0000000000000001
:RDX: 0000000000000000 RSI: ffffea000f6be780 RDI: ffff880422c49000
:RBP: ffff88037de23af8 R08: 3a00000000000000 R09: a8003daf9d000000
:R10: 57ffac50726be740 R11: 0000000000000000 R12: ffff88027d66f2d8
:R13: 0000000000000000 R14: ffff88027d66f2d8 R15: ffffea000f6be780
:FS:  00007f6733008740(0000) GS:ffff88043f400000(0000) knlGS:0000000000000000
:CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
:CR2: 00007ff9a350c000 CR3: 0000000001c0b000 CR4: 00000000000407f0
:DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
:DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
:Process abrt-retrace-cl (pid: 24002, threadinfo ffff88037de22000, task ffff88040ca12e20)
:Stack:
: 0000000000000000 ffff88043f7ecd00 ffff88037de23af8 ffff880422c4939c
: ffff880422c49024 ffff880422c49000 000000017de23b28 ffff88027d66f2d8
: ffff88037de23b28 ffff88027de36a50 ffffea000f6be780 0000000000000000
:Call Trace:
: [<ffffffff81206e26>] ext4_invalidatepage+0x86/0x1d0
: [<ffffffff81206fac>] ext4_da_invalidatepage+0x3c/0x290
: [<ffffffff8113389e>] truncate_inode_page+0x8e/0xa0
: [<ffffffff81133a01>] truncate_inode_pages_range+0x151/0x4b0
: [<ffffffff81133de5>] truncate_inode_pages+0x15/0x20
: [<ffffffff8120cd38>] ext4_evict_inode+0x118/0x490
: [<ffffffff811a1582>] evict+0xa2/0x1a0
: [<ffffffff811a1783>] iput+0x103/0x1f0
: [<ffffffff8119d960>] d_kill+0xf0/0x100
: [<ffffffff8119dfb2>] dput+0xe2/0x1b0
: [<ffffffff81189afa>] fput+0x19a/0x260
: [<ffffffff81185f46>] filp_close+0x66/0xa0
: [<ffffffff8105dc1c>] put_files_struct+0x9c/0x100
: [<ffffffff8105dd2a>] exit_files+0x4a/0x60
: [<ffffffff8105e202>] do_exit+0x192/0x8c0
: [<ffffffff8105ec7f>] do_group_exit+0x3f/0xa0
: [<ffffffff8105ecf7>] sys_exit_group+0x17/0x20
: [<ffffffff81614ee9>] system_call_fastpath+0x16/0x1b
:Code: ff ff 48 8b 45 b8 48 8b 70 58 48 85 f6 0f 85 28 ff ff ff 49 8d 46 02 f0 41 80 66 02 f7 b9 01 00 00 00 e9 9a fe ff ff 0f 0b 0f 0b <0f> 0b 0f 0b 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 
:RIP  [<ffffffff81249f4f>] jbd2_journal_invalidatepage+0x30f/0x320
: RSP <ffff88037de23a88>
Comment 1 Dave Jones 2012-10-09 23:55:04 EDT
something corrupted memory. we need the first trace that happened before this.

Note You need to log in before you can comment on or make changes to this bug.