I'm seeing a fair amount of these on a daily basis. At this point, I believe I'm seeing them mostly from my RHEL6/64 machines running the latest RHEL6.5 kernel and oafs 1.6.5.2 :
(Thoughts?) abrt_version: 2.0.8 cmdline: ro root=UUID=2001c35a-147a-4854-bf48-37681bff20b6 rd_NO_LUKS KEYBOARDTYPE=pc KEYTABLE=us LANG=en_US.UTF-8 rd_NO_MD quiet SYSFONT=latarcyrheb-sun16 rhgb rd_NO_LVM crashkernel=129M@0M rhgb quiet rd_NO_DM kernel: 2.6.32-431.3.1.el6.x86_64 last_occurrence: 1391195007 not-reportable: A kernel problem occurred, but your kernel has been tainted (flags:P ). Kernel maintainers are unable to diagnose tainted reports. time: Fri 31 Jan 2014 02:03:27 PM EST sosreport.tar.xz: Binary file, 3374352 bytes backtrace: :WARNING: at fs/dcache.c:1249 d_splice_alias+0x16e/0x180() (Tainted: P --------------- ) :Hardware name: KVM :Modules linked in: nfsd lockd nfs_acl auth_rpcgss sunrpc exportfs drbd(U) libcrc32c ebtable_nat ebtables ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 ipt_REJECT xt_CHECKSUM iptable_mangle iptable_filter ip_tables bridge openafs(P)(U) autofs4 bnx2fc cnic uio fcoe libfcoe libfc 8021q scsi_transport_fc garp stp scsi_tgt llc ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 xt_state nf_conntrack ip6table_filter ip6_tables ipv6 ext3 jbd vhost_net macvtap macvlan tun uinput microcode sg virtio_balloon i2c_piix4 i2c_core snd_hda_intel snd_hda_codec snd_hwdep snd_seq snd_seq_device snd_pcm snd_timer snd soundcore snd_page_alloc virtio_net ext4 jbd2 mbcache virtio_blk sr_mod cdrom virtio_pci virtio_ring virtio pata_acpi ata_generic ata_piix dm_mirror dm_region_hash dm_log dm_mod [last unloaded: mperf] :Pid: 12528, comm: java Tainted: P --------------- 2.6.32-431.3.1.el6.x86_64 #1 :Call Trace: :[<ffffffff81071e27>] ? warn_slowpath_common+0x87/0xc0 :[<ffffffff81071e7a>] ? warn_slowpath_null+0x1a/0x20 :[<ffffffff811a454e>] ? d_splice_alias+0x16e/0x180 :[<ffffffffa042d32d>] ? afs_linux_lookup+0x12d/0x280 [openafs] :[<ffffffff81198a45>] ? do_lookup+0x1a5/0x230 :[<ffffffff81199364>] ? __link_path_walk+0x794/0xff0 :[<ffffffff811218b7>] ? do_read_cache_page+0x97/0x180 :[<ffffffff811219e9>] ? read_cache_page_async+0x19/0x20 :[<ffffffff81121a06>] ? read_cache_page+0x16/0x20 :[<ffffffff8119609f>] ? page_getlink+0x4f/0xb0 :[<ffffffff811990c4>] ? __link_path_walk+0x4f4/0xff0 :[<ffffffff8122dad1>] ? avc_has_perm+0x71/0x90 :[<ffffffff81199e7a>] ? path_walk+0x6a/0xe0 :[<ffffffff8119a08b>] ? filename_lookup+0x6b/0xc0 :[<ffffffff8119b1b7>] ? user_path_at+0x57/0xa0 :[<ffffffffa042d836>] ? afs_linux_getattr+0x36/0x50 [openafs] :[<ffffffff811aaa30>] ? mntput_no_expire+0x30/0x110 :[<ffffffff8118e7c4>] ? cp_new_stat+0xe4/0x100 :[<ffffffff8118ea00>] ? vfs_fstatat+0x50/0xa0 :[<ffffffff8118eb7b>] ? vfs_stat+0x1b/0x20 :[<ffffffff8118eba4>] ? sys_newstat+0x24/0x50 :[<ffffffff810e2077>] ? audit_syscall_entry+0x1d7/0x200 :[<ffffffff810e1e6e>] ? __audit_syscall_exit+0x25e/0x290 :[<ffffffff8100b072>] ? system_call_fastpath+0x16/0x1b -- ******************************** David William Botsch Programmer/Analyst @CNFComputing [email protected] ******************************** _______________________________________________ OpenAFS-info mailing list [email protected] https://lists.openafs.org/mailman/listinfo/openafs-info
