Bug 891850 - [abrt]: kernel BUG at fs/nfs/idmap.c:513!
[abrt]: kernel BUG at fs/nfs/idmap.c:513!
Status: CLOSED DUPLICATE of bug 891665
Product: Fedora
Classification: Fedora
Component: kernel (Show other bugs)
x86_64 Unspecified
unspecified Severity unspecified
: ---
: ---
Assigned To: Kernel Maintainer List
Fedora Extras Quality Assurance
Depends On:
  Show dependency treegraph
Reported: 2013-01-04 02:58 EST by Radek Novacek
Modified: 2013-01-04 07:32 EST (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2013-01-04 07:32:13 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:

Attachments (Terms of Use)

  None (edit)
Description Radek Novacek 2013-01-04 02:58:33 EST
Description of problem:
I just ran "systemctl restart nfs".

Additional info:
kernel BUG at fs/nfs/idmap.c:513!
invalid opcode: 0000 [#1] SMP 
Modules linked in: ebtable_nat xt_CHECKSUM nfsv3 nfs_acl bridge stp llc nfsv4 auth_rpcgss nfs lockd sunrpc dns_resolver fscache bnep bluetooth ipt_MASQUERADE nf_conntrack_netbios_ns nf_conntrack_broadcast ip6table_mangle ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 iptable_nat nf_nat iptable_mangle nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ebtable_filter ebtables ip6table_filter ip6_tables be2iscsi iscsi_boot_sysfs bnx2i cnic uio cxgb4i cxgb4 cxgb3i cxgb3 mdio libcxgbi ib_iser rdma_cm ib_addr iw_cm ib_cm ib_sa ib_mad ib_core iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi snd_hda_codec_realtek snd_hda_intel snd_hda_codec snd_hwdep snd_seq snd_seq_device snd_pcm hp_wmi snd_page_alloc snd_timer sparse_keymap rfkill i7core_edac iTCO_wdt coretemp tg3 snd soundcore edac_core serio_raw iTCO_vendor_support lpc_ich mfd_core microcode vhost_net tun macvtap macvlan kvm_intel kvm binfmt_misc uinput nouveau mxm_wmi video i2c_algo_bit drm_kms_helper crc32c_intel ttm firewire_ohci drm firewire_core crc_itu_t i2c_core wmi
CPU 1 
Pid: 3008, comm: mount Not tainted 3.6.11-3.fc18.x86_64 #1 Hewlett-Packard HP Z400 Workstation/0B4Ch
RIP: 0010:[<ffffffffa075c3e2>]  [<ffffffffa075c3e2>] rpc_pipefs_event+0x282/0x290 [nfsv4]
RSP: 0018:ffff88046b80bc08  EFLAGS: 00010246
RAX: ffff8804fdd3ce00 RBX: ffff88050173c078 RCX: ffff8804d169e800
RDX: 0000000000000020 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffff88046b80bc58 R08: 0000000000000000 R09: ffffffffa076dda0
R10: 0000000000000000 R11: ffffffffffffffb8 R12: 0000000000000000
R13: ffff88050173c000 R14: ffff88050173c038 R15: ffff8804ed686c00
FS:  00007f9959774840(0000) GS:ffff88051fc20000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f995a83db50 CR3: 000000049af8f000 CR4: 00000000000007e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process mount (pid: 3008, threadinfo ffff88046b80a000, task ffff88049b082e20)
 ffff88046b80bc58 ffffffffa059c9db ffff8804d169e800 0000000000000000
 0000000000000000 00000000fffffffe 0000000000000000 0000000000000000
 ffff8804d169e800 0000000000000000 ffff88046b80bc98 ffffffff81627b3d
Call Trace:
 [<ffffffffa059c9db>] ? rpc_pipefs_event+0x6b/0x2a0 [sunrpc]
 [<ffffffff81627b3d>] notifier_call_chain+0x4d/0x70
 [<ffffffff81086578>] __blocking_notifier_call_chain+0x58/0x80
 [<ffffffffa05b6970>] ? rpc_cachedir_populate+0x20/0x20 [sunrpc]
 [<ffffffff810865b6>] blocking_notifier_call_chain+0x16/0x20
 [<ffffffffa05b6a4f>] rpc_fill_super+0xdf/0x190 [sunrpc]
 [<ffffffffa05b6970>] ? rpc_cachedir_populate+0x20/0x20 [sunrpc]
 [<ffffffff811936d2>] mount_ns+0x92/0xd0
 [<ffffffffa05b5099>] rpc_mount+0x29/0x30 [sunrpc]
 [<ffffffff811942e3>] mount_fs+0x43/0x1b0
 [<ffffffff8114e930>] ? __alloc_percpu+0x10/0x20
 [<ffffffff811ad7ef>] vfs_kern_mount+0x6f/0x100
 [<ffffffff811ae264>] do_kern_mount+0x54/0x110
 [<ffffffff811afdc5>] do_mount+0x315/0x8e0
 [<ffffffff81148deb>] ? memdup_user+0x4b/0x90
 [<ffffffff81148e8b>] ? strndup_user+0x5b/0x80
 [<ffffffff811b041d>] sys_mount+0x8d/0xe0
 [<ffffffff8162bd69>] system_call_fastpath+0x16/0x1b
Code: 48 c7 c7 20 a1 76 a0 31 c0 e8 85 d8 eb e0 eb cb 4c 89 ff 89 45 b8 e8 de 68 f0 ff 8b 45 b8 85 c0 0f 85 fa fe ff ff e9 b4 fd ff ff <0f> 0b 0f 0b 0f 0b 0f 1f 84 00 00 00 00 00 55 48 89 e5 48 83 ec 
RIP  [<ffffffffa075c3e2>] rpc_pipefs_event+0x282/0x290 [nfsv4]
 RSP <ffff88046b80bc08>

Potential duplicate: bug 891665
Comment 1 Josh Boyer 2013-01-04 07:32:13 EST

*** This bug has been marked as a duplicate of bug 891665 ***

Note You need to log in before you can comment on or make changes to this bug.