It might very well still be a problem, however to get around it I started using 9.04 in production, and ended up having to drop back to nfs3 anyway due to other reasons.
-Chris On 3/13/10 8:34 PM, "Jeremy Foshee" <[email protected]> wrote: Hi cthomas, This bug was reported a while ago and there hasn't been any activity in it recently. We were wondering if this is still an issue? Can you try with the latest development release of Ubuntu? ISO CD images are available from http://cdimage.ubuntu.com/releases/ . If it remains an issue, could you run the following command from a Terminal (Applications->Accessories->Terminal). It will automatically gather and attach updated debug information to this report. apport-collect -p linux 370496 Also, if you could test the latest upstream kernel available that would be great. It will allow additional upstream developers to examine the issue. Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Once you've tested the upstream kernel, please remove the 'needs-upstream- testing' tag. This can be done by clicking on the yellow pencil icon next to the tag located at the bottom of the bug description and deleting the 'needs-upstream-testing' text. Please let us know your results. Thanks in advance. [This is an automated message. Apologies if it has reached you inappropriately; please just reply to this message indicating so.] ** Tags added: needs-kernel-logs ** Tags added: needs-upstream-testing ** Tags added: kj-triage ** Changed in: linux (Ubuntu) Status: New => Incomplete -- Kernel crashes with NFS4 mount when connection is interrupted https://bugs.launchpad.net/bugs/370496 You received this bug notification because you are a direct subscriber of the bug. Status in "linux" package in Ubuntu: Incomplete Bug description: I apologize if this may be a duplicate bug, (maybe 212485 or 224750?) but I have looked at various other reported bugs with similar errors and even though the fix claims to have been pushed into 8.04.2, I am running the absolute latest of all packages and am able to easily reproduce this bug: [ 1583.017958] ------------[ cut here ]------------ [ 1583.018168] kernel BUG at /build/buildd/linux-2.6.24/net/sunrpc/rpcb_clnt.c:322! [ 1583.018541] invalid opcode: 0000 [1] SMP [ 1583.018739] CPU 0 [ 1583.018897] Modules linked in: vmmemctl iptable_filter ip_tables x_tables ipv6 nfsd nfs auth_rpcgss lockd exportfs nfs_acl sunrpc lp loop i2c_piix4 container ac button intel_agp parport_pc parport shpchp pci_hotplug pcspkr psmouse serio_raw evdev i2c_core ext3 jbd mbcache sd_mod sg sr_mod cdrom mptspi mptscsih mptbase scsi_transport_spi ata_piix floppy e1000 pata_acpi ata_generic libata scsi_mod thermal processor fan fbcon tileblit font bitblit softcursor fuse vmxnet [ 1583.020559] Pid: 5042, comm: java Not tainted 2.6.24-23-server #1 [ 1583.020788] RIP: 0010:[<ffffffff882568b2>] [<ffffffff882568b2>] :sunrpc:rpcb_getport_async+0x272/0x3c0 [ 1583.021260] RSP: 0018:ffff81003e9337f8 EFLAGS: 00010206 [ 1583.021475] RAX: ffffffff882745c0 RBX: ffff810037c49a00 RCX: 0000000000000000 [ 1583.021721] RDX: 0000000000000000 RSI: 0000000000000286 RDI: ffff81003ed1d780 [ 1583.021968] RBP: ffff81003d198000 R08: ffff81003e932000 R09: 0000000000000000 [ 1583.022222] R10: ffff810001531c60 R11: ffffffff88256640 R12: ffff81003c4e3e00 [ 1583.022468] R13: ffff81003ed1d780 R14: ffff81003e9338c8 R15: ffff81003e9339f8 [ 1583.022717] FS: 0000000000000000(0000) GS:ffffffff805c5000(0063) knlGS:00000000c49f6b90 [ 1583.023100] CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 [ 1583.023322] CR2: 00007f56aa13d000 CR3: 000000003c0b3000 CR4: 00000000000006e0 [ 1583.023572] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1583.023821] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 1583.024068] Process java (pid: 5042, threadinfo ffff81003e932000, task ffff81003c97a7f0) [ 1583.024456] Stack: ffffffff80254570 ffff81003e933800 0000000000000286 ffff81003ed1d810 [ 1583.024855] 0000000000000000 ffff81003ed1d780 ffffffff8825c390 ffff81003ed1d870 [ 1583.025241] ffff81003e9338c8 ffffffff8824db3b ffffffff8825c390 ffff81003ed1d780 [ 1583.025504] Call Trace: [ 1583.025801] [<ffffffff80254570>] wake_bit_function+0x0/0x30 [ 1583.026033] [<ffffffff8824db3b>] :sunrpc:__rpc_execute+0x6b/0x290 [ 1583.026284] [<ffffffff88246f86>] :sunrpc:rpc_do_run_task+0x76/0xd0 [ 1583.026527] [<ffffffff88247045>] :sunrpc:rpc_call_sync+0x15/0x40 [ 1583.026806] [<ffffffff882c6fdf>] :nfs:nfs4_proc_access+0x8f/0x1e0 [ 1583.027038] [<ffffffff80230000>] load_elf32_binary+0x2220/0x2370 [ 1583.027277] [<ffffffff882b4f85>] :nfs:nfs_revalidate_inode+0x25/0x70 [ 1583.027517] [<ffffffff802c822f>] dput+0x1f/0x130 [ 1583.027728] [<ffffffff882af7d4>] :nfs:nfs_lookup_revalidate+0x244/0x3d0 [ 1583.027976] [<ffffffff882b4f85>] :nfs:nfs_revalidate_inode+0x25/0x70 [ 1583.028225] [<ffffffff802c822f>] dput+0x1f/0x130 [ 1583.028437] [<ffffffff882af7d4>] :nfs:nfs_lookup_revalidate+0x244/0x3d0 [ 1583.028680] [<ffffffff8020a88a>] __switch_to+0x1ba/0x310 [ 1583.028910] [<ffffffff882b084a>] :nfs:nfs_do_access+0xda/0x350 [ 1583.029145] [<ffffffff882b0b98>] :nfs:nfs_permission+0xd8/0x1a0 [ 1583.029378] [<ffffffff802bd450>] permission+0xb0/0x160 [ 1583.029840] [<ffffffff802bf787>] __link_path_walk+0x87/0xe90 [ 1583.030066] [<ffffffff802c05eb>] link_path_walk+0x5b/0x100 [ 1583.030294] [<ffffffff802cd9b7>] mntput_no_expire+0x27/0xb0 [ 1583.030525] [<ffffffff8025a1d3>] getnstimeofday+0x33/0xa0 [ 1583.030745] [<ffffffff80257c0b>] ktime_get_ts+0x1b/0x50 [ 1583.030962] [<ffffffff802cbcd8>] touch_atime+0x88/0x160 [ 1583.031180] [<ffffffff802bfd6a>] __link_path_walk+0x66a/0xe90 [ 1583.031409] [<ffffffff802c05eb>] link_path_walk+0x5b/0x100 [ 1583.031636] [<ffffffff802cd9b7>] mntput_no_expire+0x27/0xb0 [ 1583.031858] [<ffffffff8025a1d3>] getnstimeofday+0x33/0xa0 [ 1583.032077] [<ffffffff80257c0b>] ktime_get_ts+0x1b/0x50 [ 1583.032302] [<ffffffff8025f240>] futex_wake+0x50/0xf0 [ 1583.032516] [<ffffffff802c08aa>] do_path_lookup+0x8a/0x250 [ 1583.032737] [<ffffffff802bf449>] getname+0x1a9/0x220 [ 1583.032948] [<ffffffff802c150b>] __user_walk_fd+0x4b/0x80 [ 1583.033168] [<ffffffff802b910f>] vfs_stat_fd+0x2f/0x80 [ 1583.033383] [<ffffffff802cd9b7>] mntput_no_expire+0x27/0xb0 [ 1583.033607] [<ffffffff8025a1d3>] getnstimeofday+0x33/0xa0 [ 1583.033826] [<ffffffff80257c0b>] ktime_get_ts+0x1b/0x50 [ 1583.034048] [<ffffffff80229edf>] sys32_stat64+0x1f/0x50 [ 1583.034270] [<ffffffff802611cf>] compat_sys_futex+0x9f/0x130 [ 1583.034494] [<ffffffff802537e0>] sys_clock_gettime+0x50/0xb0 [ 1583.034717] [<ffffffff8025996f>] do_gettimeofday+0x2f/0xc0 [ 1583.034939] [<ffffffff80229cf0>] sys32_gettimeofday+0x50/0xa0 [ 1583.035164] [<ffffffff80229410>] sysenter_do_call+0x1b/0x67 [ 1583.035389] [<ffffffff80337570>] apparmor_inode_permission+0x0/0x60 [ 1583.035627] [ 1583.035774] [ 1583.035774] Code: 0f 0b eb fe 8b 85 b8 00 00 00 0f b7 b7 48 01 00 00 48 c7 c2 [ 1583.036373] RIP [<ffffffff882568b2>] :sunrpc:rpcb_getport_async+0x272/0x3c0 [ 1583.036632] RSP <ffff81003e9337f8> [ 1583.040234] ---[ end trace 6f442847caba0511 ]--- Linux web01 2.6.24-23-server #1 SMP Wed Apr 1 22:14:30 UTC 2009 x86_64 GNU/Linux Ubuntu 2.6.24-23.52-server The issue occurs when I am failing over nfs mounts from one san head to another. It takes about 30 seconds to fully come back up and within that time frame the kernel crashes just about every time. After the mounts come back, doing something such as a df causes a segmentation fault. On another note, the kernel from 9.04, (2.6.28-11-server) does not appear to have this problem. Let me know if you need any more information. Thanks To unsubscribe from this bug, go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/370496/+subscribe -- Kernel crashes with NFS4 mount when connection is interrupted https://bugs.launchpad.net/bugs/370496 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
