Bug 891850

Summary: [abrt]: kernel BUG at fs/nfs/idmap.c:513!
Product: [Fedora] Fedora Reporter: Radek Novacek <rnovacek>
Component: kernelAssignee: Kernel Maintainer List <kernel-maint>
Status: CLOSED DUPLICATE QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 18CC: gansalmon, itamar, jonathan, kernel-maint, madhu.chinakonda, ovasik
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Unspecified   
Whiteboard: abrt_hash:9902630334d902c53fa0e72e9e29104a44252b7f
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-01-04 12:32:13 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Radek Novacek 2013-01-04 07:58:33 UTC
Description of problem:
I just ran "systemctl restart nfs".

Additional info:
kernel BUG at fs/nfs/idmap.c:513!
invalid opcode: 0000 [#1] SMP 
Modules linked in: ebtable_nat xt_CHECKSUM nfsv3 nfs_acl bridge stp llc nfsv4 auth_rpcgss nfs lockd sunrpc dns_resolver fscache bnep bluetooth ipt_MASQUERADE nf_conntrack_netbios_ns nf_conntrack_broadcast ip6table_mangle ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 iptable_nat nf_nat iptable_mangle nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ebtable_filter ebtables ip6table_filter ip6_tables be2iscsi iscsi_boot_sysfs bnx2i cnic uio cxgb4i cxgb4 cxgb3i cxgb3 mdio libcxgbi ib_iser rdma_cm ib_addr iw_cm ib_cm ib_sa ib_mad ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi snd_hda_codec_realtek snd_hda_intel snd_hda_codec snd_hwdep snd_seq snd_seq_device snd_pcm hp_wmi snd_page_alloc snd_timer sparse_keymap rfkill i7core_edac iTCO_wdt coretemp tg3 snd soundcore edac_core serio_raw iTCO_vendor_support lpc_ich mfd_core microcode vhost_net tun macvtap macvlan kvm_intel kvm binfmt_misc uinput nouveau mxm_wmi video i2c_algo_bit drm_kms_helper crc32c_intel ttm firewire_ohci drm firewire_core crc_itu_t i2c_core wmi
CPU 1 
Pid: 3008, comm: mount Not tainted 3.6.11-3.fc18.x86_64 #1 Hewlett-Packard HP Z400 Workstation/0B4Ch
RIP: 0010:[<ffffffffa075c3e2>]  [<ffffffffa075c3e2>] rpc_pipefs_event+0x282/0x290 [nfsv4]
RSP: 0018:ffff88046b80bc08  EFLAGS: 00010246
RAX: ffff8804fdd3ce00 RBX: ffff88050173c078 RCX: ffff8804d169e800
RDX: 0000000000000020 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffff88046b80bc58 R08: 0000000000000000 R09: ffffffffa076dda0
R10: 0000000000000000 R11: ffffffffffffffb8 R12: 0000000000000000
R13: ffff88050173c000 R14: ffff88050173c038 R15: ffff8804ed686c00
FS:  00007f9959774840(0000) GS:ffff88051fc20000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f995a83db50 CR3: 000000049af8f000 CR4: 00000000000007e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process mount (pid: 3008, threadinfo ffff88046b80a000, task ffff88049b082e20)
Stack:
 ffff88046b80bc58 ffffffffa059c9db ffff8804d169e800 0000000000000000
 0000000000000000 00000000fffffffe 0000000000000000 0000000000000000
 ffff8804d169e800 0000000000000000 ffff88046b80bc98 ffffffff81627b3d
Call Trace:
 [<ffffffffa059c9db>] ? rpc_pipefs_event+0x6b/0x2a0 [sunrpc]
 [<ffffffff81627b3d>] notifier_call_chain+0x4d/0x70
 [<ffffffff81086578>] __blocking_notifier_call_chain+0x58/0x80
 [<ffffffffa05b6970>] ? rpc_cachedir_populate+0x20/0x20 [sunrpc]
 [<ffffffff810865b6>] blocking_notifier_call_chain+0x16/0x20
 [<ffffffffa05b6a4f>] rpc_fill_super+0xdf/0x190 [sunrpc]
 [<ffffffffa05b6970>] ? rpc_cachedir_populate+0x20/0x20 [sunrpc]
 [<ffffffff811936d2>] mount_ns+0x92/0xd0
 [<ffffffffa05b5099>] rpc_mount+0x29/0x30 [sunrpc]
 [<ffffffff811942e3>] mount_fs+0x43/0x1b0
 [<ffffffff8114e930>] ? __alloc_percpu+0x10/0x20
 [<ffffffff811ad7ef>] vfs_kern_mount+0x6f/0x100
 [<ffffffff811ae264>] do_kern_mount+0x54/0x110
 [<ffffffff811afdc5>] do_mount+0x315/0x8e0
 [<ffffffff81148deb>] ? memdup_user+0x4b/0x90
 [<ffffffff81148e8b>] ? strndup_user+0x5b/0x80
 [<ffffffff811b041d>] sys_mount+0x8d/0xe0
 [<ffffffff8162bd69>] system_call_fastpath+0x16/0x1b
Code: 48 c7 c7 20 a1 76 a0 31 c0 e8 85 d8 eb e0 eb cb 4c 89 ff 89 45 b8 e8 de 68 f0 ff 8b 45 b8 85 c0 0f 85 fa fe ff ff e9 b4 fd ff ff <0f> 0b 0f 0b 0f 0b 0f 1f 84 00 00 00 00 00 55 48 89 e5 48 83 ec 
RIP  [<ffffffffa075c3e2>] rpc_pipefs_event+0x282/0x290 [nfsv4]
 RSP <ffff88046b80bc08>

Potential duplicate: bug 891665

Comment 1 Josh Boyer 2013-01-04 12:32:13 UTC

*** This bug has been marked as a duplicate of bug 891665 ***