[Bug 370496] Re: Kernel crashes with NFS4 mount when connection is interrupted

cthomas chris.thomas at gifts.com
Tue Mar 16 19:25:19 UTC 2010


It might very well still be a problem, however to get around it I
started using 9.04 in production, and ended up having to drop back to
nfs3 anyway due to other reasons.

-Chris

On 3/13/10 8:34 PM, "Jeremy Foshee" <jeremy.foshee at canonical.com> wrote:

Hi cthomas,

This bug was reported a while ago and there hasn't been any activity in
it recently. We were wondering if this is still an issue? Can you try
with the latest development release of Ubuntu?  ISO CD images are
available from http://cdimage.ubuntu.com/releases/ .

If it remains an issue, could you run the following command from a
Terminal (Applications->Accessories->Terminal).  It will automatically
gather and attach updated debug information to this report.

apport-collect -p linux 370496

Also, if you could test the latest upstream kernel available that would
be great.  It will allow additional upstream developers to examine the
issue.  Refer to https://wiki.ubuntu.com/KernelMainlineBuilds .  Once
you've tested the upstream kernel, please remove the 'needs-upstream-
testing' tag.  This can be done by clicking on the yellow pencil icon
next to the tag located at the bottom of the bug description and
deleting the 'needs-upstream-testing' text.  Please let us know your
results.

Thanks in advance.

[This is an automated message.  Apologies if it has reached you
inappropriately; please just reply to this message indicating so.]


** Tags added: needs-kernel-logs

** Tags added: needs-upstream-testing

** Tags added: kj-triage

** Changed in: linux (Ubuntu)
       Status: New => Incomplete

--
Kernel crashes with NFS4 mount when connection is interrupted
https://bugs.launchpad.net/bugs/370496
You received this bug notification because you are a direct subscriber
of the bug.

Status in "linux" package in Ubuntu: Incomplete

Bug description:
I apologize if this may be a duplicate bug, (maybe 212485 or 224750?) but I have looked at various other reported bugs with similar errors and even though the fix claims to have been pushed into 8.04.2, I am running the absolute latest of all packages and am able to easily reproduce this bug:

[ 1583.017958] ------------[ cut here ]------------
[ 1583.018168] kernel BUG at /build/buildd/linux-2.6.24/net/sunrpc/rpcb_clnt.c:322!
[ 1583.018541] invalid opcode: 0000 [1] SMP
[ 1583.018739] CPU 0
[ 1583.018897] Modules linked in: vmmemctl iptable_filter ip_tables x_tables ipv6 nfsd nfs auth_rpcgss lockd exportfs nfs_acl sunrpc lp loop i2c_piix4 container ac button intel_agp parport_pc parport shpchp pci_hotplug pcspkr psmouse serio_raw evdev i2c_core ext3 jbd mbcache sd_mod sg sr_mod cdrom mptspi mptscsih mptbase scsi_transport_spi ata_piix floppy e1000 pata_acpi ata_generic libata scsi_mod thermal processor fan fbcon tileblit font bitblit softcursor fuse vmxnet
[ 1583.020559] Pid: 5042, comm: java Not tainted 2.6.24-23-server #1
[ 1583.020788] RIP: 0010:[<ffffffff882568b2>]  [<ffffffff882568b2>] :sunrpc:rpcb_getport_async+0x272/0x3c0
[ 1583.021260] RSP: 0018:ffff81003e9337f8  EFLAGS: 00010206
[ 1583.021475] RAX: ffffffff882745c0 RBX: ffff810037c49a00 RCX: 0000000000000000
[ 1583.021721] RDX: 0000000000000000 RSI: 0000000000000286 RDI: ffff81003ed1d780
[ 1583.021968] RBP: ffff81003d198000 R08: ffff81003e932000 R09: 0000000000000000
[ 1583.022222] R10: ffff810001531c60 R11: ffffffff88256640 R12: ffff81003c4e3e00
[ 1583.022468] R13: ffff81003ed1d780 R14: ffff81003e9338c8 R15: ffff81003e9339f8
[ 1583.022717] FS:  0000000000000000(0000) GS:ffffffff805c5000(0063) knlGS:00000000c49f6b90
[ 1583.023100] CS:  0010 DS: 002b ES: 002b CR0: 0000000080050033
[ 1583.023322] CR2: 00007f56aa13d000 CR3: 000000003c0b3000 CR4: 00000000000006e0
[ 1583.023572] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 1583.023821] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[ 1583.024068] Process java (pid: 5042, threadinfo ffff81003e932000, task ffff81003c97a7f0)
[ 1583.024456] Stack:  ffffffff80254570 ffff81003e933800 0000000000000286 ffff81003ed1d810
[ 1583.024855]  0000000000000000 ffff81003ed1d780 ffffffff8825c390 ffff81003ed1d870
[ 1583.025241]  ffff81003e9338c8 ffffffff8824db3b ffffffff8825c390 ffff81003ed1d780
[ 1583.025504] Call Trace:
[ 1583.025801]  [<ffffffff80254570>] wake_bit_function+0x0/0x30
[ 1583.026033]  [<ffffffff8824db3b>] :sunrpc:__rpc_execute+0x6b/0x290
[ 1583.026284]  [<ffffffff88246f86>] :sunrpc:rpc_do_run_task+0x76/0xd0
[ 1583.026527]  [<ffffffff88247045>] :sunrpc:rpc_call_sync+0x15/0x40
[ 1583.026806]  [<ffffffff882c6fdf>] :nfs:nfs4_proc_access+0x8f/0x1e0
[ 1583.027038]  [<ffffffff80230000>] load_elf32_binary+0x2220/0x2370
[ 1583.027277]  [<ffffffff882b4f85>] :nfs:nfs_revalidate_inode+0x25/0x70
[ 1583.027517]  [<ffffffff802c822f>] dput+0x1f/0x130
[ 1583.027728]  [<ffffffff882af7d4>] :nfs:nfs_lookup_revalidate+0x244/0x3d0
[ 1583.027976]  [<ffffffff882b4f85>] :nfs:nfs_revalidate_inode+0x25/0x70
[ 1583.028225]  [<ffffffff802c822f>] dput+0x1f/0x130
[ 1583.028437]  [<ffffffff882af7d4>] :nfs:nfs_lookup_revalidate+0x244/0x3d0
[ 1583.028680]  [<ffffffff8020a88a>] __switch_to+0x1ba/0x310
[ 1583.028910]  [<ffffffff882b084a>] :nfs:nfs_do_access+0xda/0x350
[ 1583.029145]  [<ffffffff882b0b98>] :nfs:nfs_permission+0xd8/0x1a0
[ 1583.029378]  [<ffffffff802bd450>] permission+0xb0/0x160
[ 1583.029840]  [<ffffffff802bf787>] __link_path_walk+0x87/0xe90
[ 1583.030066]  [<ffffffff802c05eb>] link_path_walk+0x5b/0x100
[ 1583.030294]  [<ffffffff802cd9b7>] mntput_no_expire+0x27/0xb0
[ 1583.030525]  [<ffffffff8025a1d3>] getnstimeofday+0x33/0xa0
[ 1583.030745]  [<ffffffff80257c0b>] ktime_get_ts+0x1b/0x50
[ 1583.030962]  [<ffffffff802cbcd8>] touch_atime+0x88/0x160
[ 1583.031180]  [<ffffffff802bfd6a>] __link_path_walk+0x66a/0xe90
[ 1583.031409]  [<ffffffff802c05eb>] link_path_walk+0x5b/0x100
[ 1583.031636]  [<ffffffff802cd9b7>] mntput_no_expire+0x27/0xb0
[ 1583.031858]  [<ffffffff8025a1d3>] getnstimeofday+0x33/0xa0
[ 1583.032077]  [<ffffffff80257c0b>] ktime_get_ts+0x1b/0x50
[ 1583.032302]  [<ffffffff8025f240>] futex_wake+0x50/0xf0
[ 1583.032516]  [<ffffffff802c08aa>] do_path_lookup+0x8a/0x250
[ 1583.032737]  [<ffffffff802bf449>] getname+0x1a9/0x220
[ 1583.032948]  [<ffffffff802c150b>] __user_walk_fd+0x4b/0x80
[ 1583.033168]  [<ffffffff802b910f>] vfs_stat_fd+0x2f/0x80
[ 1583.033383]  [<ffffffff802cd9b7>] mntput_no_expire+0x27/0xb0
[ 1583.033607]  [<ffffffff8025a1d3>] getnstimeofday+0x33/0xa0
[ 1583.033826]  [<ffffffff80257c0b>] ktime_get_ts+0x1b/0x50
[ 1583.034048]  [<ffffffff80229edf>] sys32_stat64+0x1f/0x50
[ 1583.034270]  [<ffffffff802611cf>] compat_sys_futex+0x9f/0x130
[ 1583.034494]  [<ffffffff802537e0>] sys_clock_gettime+0x50/0xb0
[ 1583.034717]  [<ffffffff8025996f>] do_gettimeofday+0x2f/0xc0
[ 1583.034939]  [<ffffffff80229cf0>] sys32_gettimeofday+0x50/0xa0
[ 1583.035164]  [<ffffffff80229410>] sysenter_do_call+0x1b/0x67
[ 1583.035389]  [<ffffffff80337570>] apparmor_inode_permission+0x0/0x60
[ 1583.035627]
[ 1583.035774]
[ 1583.035774] Code: 0f 0b eb fe 8b 85 b8 00 00 00 0f b7 b7 48 01 00 00 48 c7 c2
[ 1583.036373] RIP  [<ffffffff882568b2>] :sunrpc:rpcb_getport_async+0x272/0x3c0
[ 1583.036632]  RSP <ffff81003e9337f8>
[ 1583.040234] ---[ end trace 6f442847caba0511 ]---


Linux web01 2.6.24-23-server #1 SMP Wed Apr 1 22:14:30 UTC 2009 x86_64 GNU/Linux
Ubuntu 2.6.24-23.52-server


The issue occurs when I am failing over nfs mounts from one san head to another. It takes about 30 seconds to fully come back up and within that time frame the kernel crashes just about every time. After the mounts come back, doing something such as a df causes a segmentation fault.

On another note, the kernel from 9.04, (2.6.28-11-server) does not
appear to have this problem.

Let me know if you need any more information.

Thanks

To unsubscribe from this bug, go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/370496/+subscribe

-- 
Kernel crashes with NFS4 mount when connection is interrupted
https://bugs.launchpad.net/bugs/370496
You received this bug notification because you are a member of Kernel
Bugs, which is subscribed to linux in ubuntu.




More information about the kernel-bugs mailing list