Kernel Oops with nfs4 mount

Bug #148600 reported by Marcel Hild
8
Affects Status Importance Assigned to Milestone
nfs-utils (Ubuntu)
New
Undecided
Unassigned

Bug Description

When accessing nfs4 mounts I get kernel 2 Oops.

On the server I am running the latest feisty version:
ii nfs-common 1.0.12-4 NFS support files common to client and serve
ii nfs-kernel-ser 1.0.12-4 support for NFS kernel server

On the client I am running the latest gutsy version:
ii nfs-common 1:1.1.1~git-20070709-3ubuntu1 NFS support files common to client and server
ii nfs-kernel-server 1:1.1.1~git-20070709-3ubuntu1 support for NFS kernel server

The Oops does not happen after the mount, but after some random read / write time using the share.

Oct 3 17:15:42 rumo kernel: [112389.656000] Oops: 0000 [#1]
Oct 3 17:15:42 rumo kernel: [112389.656000] SMP
Oct 3 17:15:42 rumo kernel: [112389.656000] Modules linked in: isofs udf af_packet binfmt_misc rfcomm l2cap bluetooth nfsd exportfs thinkpad_acpi ppdev autofs4 fglrx(P) ipv6 acpi_cpufreq cpufreq_ondemand cpufreq_conservative cpufreq_stats freq_table cpufreq_powersave cpufreq_userspace ac container video battery sbs button bay dock nfs lockd sunrpc squashfs loop parport_pc lp parport irtty_sir sir_dev snd_hda_intel snd_pcm_oss snd_mixer_oss snd_pcm snd_seq_dummy snd_seq_oss ipw3945 pcmcia snd_seq_midi snd_rawmidi snd_seq_midi_event snd_seq snd_timer snd_seq_device iTCO_wdt iTCO_vendor_support ieee80211 nsc_ircc ieee80211_crypt irda serio_raw pcspkr yenta_socket rsrc_nonstatic pcmcia_core crc_ccitt psmouse snd soundcore snd_page_alloc intel_agp agpgart shpchp pci_hotplug evdev ext3 jbd mbcache sg sr_mod cdrom sd_mod ata_generic usbhid hid ahci ata_piix ehci_hcd e1000 libata scsi_mod uhci_hcd usbcore dm_mirror dm_snapshot dm_mod thermal processor fan fuse apparmor commoncap
Oct 3 17:15:42 rumo kernel: [112389.656000] CPU: 0
Oct 3 17:15:42 rumo kernel: [112389.656000] EIP: 0060:[<f8d30cf5>] Tainted: P VLI
Oct 3 17:15:42 rumo kernel: [112389.656000] EFLAGS: 00010246 (2.6.22-12-generic #1)
Oct 3 17:15:42 rumo kernel: [112389.656000] EIP is at nfs_update_inode+0xc5/0x6d0 [nfs]
Oct 3 17:15:42 rumo kernel: [112389.656000] eax: 00000000 ebx: 000081a4 ecx: 000081a4 edx: 00008000
Oct 3 17:15:42 rumo kernel: [112389.656000] esi: 0006e007 edi: d5cdfe40 ebp: d00b5890 esp: ca9d1dd8
Oct 3 17:15:42 rumo kernel: [112389.656000] ds: 007b es: 007b fs: 00d8 gs: 0033 ss: 0068
Oct 3 17:15:42 rumo kernel: [112389.656000] Process umount.nfs4 (pid: 28956, ti=ca9d0000 task=ddf2c000 task.ti=ca9d0000)
Oct 3 17:15:42 rumo kernel: [112389.656000] Stack: d00b5890 c02f373b 00000001 cf380800 00000004 00000000 ddf2c000 cf64d6b0
Oct 3 17:15:42 rumo kernel: [112389.656000] d00b5768 ca9d1e1c d00b5890 01ab968e c01320c5 cf380780 00000000 d00b5890
Oct 3 17:15:42 rumo kernel: [112389.656000] cf64d6b0 cf380780 d00b5890 f8d326d4 cf64d600 00000000 f8d404fb cf64d600
Oct 3 17:15:42 rumo kernel: [112389.656000] Call Trace:
Oct 3 17:15:42 rumo kernel: [112389.656000] [out_of_line_wait_on_bit+123/144] out_of_line_wait_on_bit+0x7b/0x90
Oct 3 17:15:42 rumo kernel: [112389.656000] [sigprocmask+101/256] sigprocmask+0x65/0x100
Oct 3 17:15:42 rumo kernel: [112389.656000] [<f8d326d4>] nfs_post_op_update_inode+0x24/0x50 [nfs]
Oct 3 17:15:42 rumo kernel: [112389.656000] [<f8d404fb>] nfs4_proc_delegreturn+0x17b/0x180 [nfs]
Oct 3 17:15:42 rumo kernel: [112389.656000] [<f8d4c867>] nfs_do_return_delegation+0x17/0x30 [nfs]
Oct 3 17:15:42 rumo kernel: [112389.656000] [<f8d2f2e9>] nfs_dentry_iput+0x29/0x80 [nfs]
Oct 3 17:15:42 rumo kernel: [112389.656000] [shrink_dcache_for_umount_subtree+130/560] shrink_dcache_for_umount_subtree+0x82/0x230
Oct 3 17:15:42 rumo kernel: [112389.656000] [__wake_up_common+57/96] __wake_up_common+0x39/0x60
Oct 3 17:15:42 rumo kernel: [112389.656000] [shrink_dcache_for_umount+55/80] shrink_dcache_for_umount+0x37/0x50
Oct 3 17:15:42 rumo kernel: [112389.656000] [generic_shutdown_super+24/240] generic_shutdown_super+0x18/0xf0
Oct 3 17:15:42 rumo kernel: [112389.656000] [kill_anon_super+9/64] kill_anon_super+0x9/0x40
Oct 3 17:15:42 rumo kernel: [112389.656000] [<f8d3328c>] nfs_kill_super+0xc/0x20 [nfs]
Oct 3 17:15:42 rumo kernel: [112389.656000] [deactivate_super+93/128] deactivate_super+0x5d/0x80
Oct 3 17:15:42 rumo kernel: [112389.656000] [expire_mount_list+194/320] expire_mount_list+0xc2/0x140
Oct 3 17:15:42 rumo kernel: [112389.656000] [shrink_submounts+179/208] shrink_submounts+0xb3/0xd0
Oct 3 17:15:43 rumo kernel: [112389.656000] [sys_umount+265/624] sys_umount+0x109/0x270
Oct 3 17:15:43 rumo kernel: [112389.656000] [dput+135/256] dput+0x87/0x100
Oct 3 17:15:43 rumo kernel: [112389.656000] [__fput+299/416] __fput+0x12b/0x1a0
Oct 3 17:15:43 rumo kernel: [112389.656000] [mntput_no_expire+36/160] mntput_no_expire+0x24/0xa0
Oct 3 17:15:43 rumo kernel: [112389.656000] [sys_oldumount+23/32] sys_oldumount+0x17/0x20
Oct 3 17:15:43 rumo kernel: [112389.656000] [sysenter_past_esp+107/169] sysenter_past_esp+0x6b/0xa9
Oct 3 17:15:43 rumo kernel: [112389.656000] =======================
Oct 3 17:15:43 rumo kernel: [112389.656000] Code: 0f ba ab 8c 00 00 00 02 89 e8 e8 e7 fc ff ff b8 8c ff ff ff 83 c4 3c 5b 5e 5f 5d c3 8b 85 98 00 00 00 8b b8 64 01 00 00 8b 40 38 <3b> 68 0c 0f 84 57 04 00 00 8b 54 24 1c 8b 4c 24 20 8b 82 8c 00
Oct 3 17:15:43 rumo kernel: [112389.656000] EIP: [<f8d30cf5>] nfs_update_inode+0xc5/0x6d0 [nfs] SS:ESP 0068:ca9d1dd8
Oct 3 17:15:43 rumo automount[28954]: >> mount.nfs4: /mnt/nfs4/smeik is already mounted or busy
Oct 3 17:15:43 rumo automount[28954]: mount(generic): failed to mount smeik:/ (type nfs4) on /mnt/nfs4/smeik
Oct 3 17:15:43 rumo automount[28954]: failed to recover from partial expiry of /mnt/nfs4/smeik
Oct 3 17:16:16 rumo kernel: [112423.544000] BUG: unable to handle kernel NULL pointer dereference at virtual address 0000000c
Oct 3 17:16:16 rumo kernel: [112423.544000] printing eip:
Oct 3 17:16:16 rumo kernel: [112423.544000] f8d30cf5
Oct 3 17:16:16 rumo kernel: [112423.544000] *pde = 00000000
Oct 3 17:16:16 rumo kernel: [112423.544000] Oops: 0000 [#2]
Oct 3 17:16:16 rumo kernel: [112423.544000] SMP
Oct 3 17:16:16 rumo kernel: [112423.544000] Modules linked in: isofs udf af_packet binfmt_misc rfcomm l2cap bluetooth nfsd exportfs thinkpad_acpi ppdev autofs4 fglrx(P) ipv6 acpi_cpufreq cpufreq_ondemand cpufreq_conservative cpufreq_stats freq_table cpufreq_powersave cpufreq_userspace ac container video battery sbs button bay dock nfs lockd sunrpc squashfs loop parport_pc lp parport irtty_sir sir_dev snd_hda_intel snd_pcm_oss snd_mixer_oss snd_pcm snd_seq_dummy snd_seq_oss ipw3945 pcmcia snd_seq_midi snd_rawmidi snd_seq_midi_event snd_seq snd_timer snd_seq_device iTCO_wdt iTCO_vendor_support ieee80211 nsc_ircc ieee80211_crypt irda serio_raw pcspkr yenta_socket rsrc_nonstatic pcmcia_core crc_ccitt psmouse snd soundcore snd_page_alloc intel_agp agpgart shpchp pci_hotplug evdev ext3 jbd mbcache sg sr_mod cdrom sd_mod ata_generic usbhid hid ahci ata_piix ehci_hcd e1000 libata scsi_mod uhci_hcd usbcore dm_mirror dm_snapshot dm_mod thermal processor fan fuse apparmor commoncap
Oct 3 17:16:16 rumo kernel: [112423.544000] CPU: 1
Oct 3 17:16:16 rumo kernel: [112423.544000] EIP: 0060:[<f8d30cf5>] Tainted: P VLI
Oct 3 17:16:16 rumo kernel: [112423.544000] EFLAGS: 00010246 (2.6.22-12-generic #1)
Oct 3 17:16:16 rumo kernel: [112423.544000] EIP is at nfs_update_inode+0xc5/0x6d0 [nfs]
Oct 3 17:16:16 rumo kernel: [112423.544000] eax: 00000000 ebx: 000081a4 ecx: 000081a4 edx: 00008000
Oct 3 17:16:16 rumo kernel: [112423.544000] esi: 0006e003 edi: d5cdfe40 ebp: d00b5618 esp: c9bb5f24
Oct 3 17:16:16 rumo kernel: [112423.544000] ds: 007b es: 007b fs: 00d8 gs: 0000 ss: 0068
Oct 3 17:16:16 rumo kernel: [112423.544000] Process 192.168.1.4-del (pid: 30508, ti=c9bb4000 task=ddf2d4c0 task.ti=c9bb4000)
Oct 3 17:16:16 rumo kernel: [112423.544000] Stack: d00b5618 c02f373b 00000001 e386af80 00000004 00000000 ddf2d4c0 d550bcb0
Oct 3 17:16:16 rumo kernel: [112423.544000] d00b54f0 c9bb5f68 d00b5618 01abb7a6 c01320c5 e386af00 00000000 d00b5618
Oct 3 17:16:16 rumo kernel: [112423.544000] d550bcb0 e386af00 d00b5618 f8d326d4 d550bc00 00000000 f8d404fb d550bc00
Oct 3 17:16:16 rumo kernel: [112423.544000] Call Trace:
Oct 3 17:16:16 rumo kernel: [112423.544000] [out_of_line_wait_on_bit+123/144] out_of_line_wait_on_bit+0x7b/0x90
Oct 3 17:16:16 rumo kernel: [112423.544000] [sigprocmask+101/256] sigprocmask+0x65/0x100
Oct 3 17:16:16 rumo kernel: [112423.544000] [<f8d326d4>] nfs_post_op_update_inode+0x24/0x50 [nfs]
Oct 3 17:16:16 rumo kernel: [112423.544000] [<f8d404fb>] nfs4_proc_delegreturn+0x17b/0x180 [nfs]
Oct 3 17:16:16 rumo kernel: [112423.544000] [<f8d4c867>] nfs_do_return_delegation+0x17/0x30 [nfs]
Oct 3 17:16:16 rumo kernel: [112423.544000] [<f8d4d0f7>] nfs_do_expire_all_delegations+0x77/0xa0 [nfs]
Oct 3 17:16:16 rumo kernel: [112423.544000] [<f8d4d080>] nfs_do_expire_all_delegations+0x0/0xa0 [nfs]
Oct 3 17:16:16 rumo kernel: [112423.544000] [kthread+66/112] kthread+0x42/0x70
Oct 3 17:16:16 rumo kernel: [112423.544000] [kthread+0/112] kthread+0x0/0x70
Oct 3 17:16:16 rumo kernel: [112423.544000] [kernel_thread_helper+7/16] kernel_thread_helper+0x7/0x10
Oct 3 17:16:16 rumo kernel: [112423.544000] =======================
Oct 3 17:16:16 rumo kernel: [112423.544000] Code: 0f ba ab 8c 00 00 00 02 89 e8 e8 e7 fc ff ff b8 8c ff ff ff 83 c4 3c 5b 5e 5f 5d c3 8b 85 98 00 00 00 8b b8 64 01 00 00 8b 40 38 <3b> 68 0c 0f 84 57 04 00 00 8b 54 24 1c 8b 4c 24 20 8b 82 8c 00
Oct 3 17:16:16 rumo kernel: [112423.544000] EIP: [<f8d30cf5>] nfs_update_inode+0xc5/0x6d0 [nfs] SS:ESP 0068:c9bb5f24
Oct 3 17:16:52 rumo automount[306]: >> mount.nfs4: can't get address for .hidden
Oct 3 17:16:52 rumo automount[306]: mount(generic): failed to mount .hidden:/ (type nfs4) on /mnt/nfs4/.hidden
Oct 3 17:16:52 rumo automount[306]: failed to mount /mnt/nfs4/.hidden

Tags: kernel-oops
Revision history for this message
James Bardin (jbardin-deactivatedaccount) wrote :

same result with nfs3 and sec=krb5. mount worsk, but any access to the mount crashes the caller with a similar call trace to above.
I also replicated the nfs4 crash.

In nfs3 the keytab is optional, and the I can get immediate segfaults without the keytab in place.
My log output always seems to end with a line about auth_rpcgssd.
 kernel: [ 2636.734267] EIP: [<f8dab901>] g_token_size+0x1/0x20 [auth_rpcgss] SS:ESP 0068:f02c9c40

Kerberos is working fine

Revision history for this message
Andrea Garbarini (garba) wrote :

at least you guys get as far as getting a kernel oops :) on my gutsy box i can't even succesfully mount my nfs shares served by a debian etch server, i get a permission denied error, see this post here:

http://ubuntuforums.org/showthread.php?t=570320

works nicely on feisty though, i fear there's been some major upstream change that broke backward compatibility

Revision history for this message
AZ (m-dev) wrote :
Download full text (27.4 KiB)

Hi,

I'm running a machine that mounts nfs4 over a openvpn tunnel automatically on startup.
I am running gutsy I just updated to the 2.6.22-14 kernel, there was no problem before.
Now the machine crashes each time I try to mount my nfs4 share.
What makes this bug even worse is that after the nfs4 BUG occurs, my keyboard and mouse are frozen.

Dec 19 08:40:07 charlie kernel: [ 72.540499] BUG: unable to handle kernel NULL pointer dereference at virtual address 00000038
Dec 19 08:40:07 charlie kernel: [ 72.540504] printing eip:
Dec 19 08:40:07 charlie kernel: [ 72.540506] f9069040
Dec 19 08:40:07 charlie kernel: [ 72.540507] *pde = 00000000
Dec 19 08:40:07 charlie kernel: [ 72.540510] Oops: 0000 [#1]
Dec 19 08:40:07 charlie kernel: [ 72.540513] SMP
Dec 19 08:40:07 charlie kernel: [ 72.540517] Modules linked in: tun ppdev fglrx(P) acpi_cpufreq cpufreq_userspace cpufreq_conservative cpufreq_powersave cpufreq_ondemand cpufreq_stats freq_table button video container ac sbs dock battery xt_tcpudp ipt_TOS xt_TCPMSS ipt_LOG ipt_REJECT iptable_nat nf_nat iptable_mangle iptable_filter xt_multiport xt_state xt_limit xt_conntrack nf_conntrack_ftp nf_conntrack_ipv4 nf_conntrack nfnetlink ip_tables x_tables nls_iso8859_1 nls_cp437 vfat fat nfs lockd sunrpc w83627hf hwmon_vid eeprom i2c_i801 rivafb fb_ddc i2c_algo_bit vgastate rtc_core rtc_lib twofish_i586 aes_i586 ntfs dm_crypt dm_mod xcbc tgr192 wp512 camellia fcrypt pcbc tea ipv6 twofish twofish_common sha512 sha256 sha1 serpent michael_mic md4 lrw khazad gf128mul des deflate zlib_deflate crypto_null crc32c libcrc32c cbc cast6 cast5 blowfish anubis aes sbp2 lp arc4 ecb saa7134_alsa blkcipher snd_hda_intel snd_pcm_oss snd_seq_dummy snd_mixer_oss rc80211_simple snd_seq_oss saa7134_dvb dvb_pll snd_pcm snd_seq_midi rt2
Dec 19 08:40:07 charlie kernel: 00usb rt2x00usb rt2x00lib snd_rawmidi usb_storage ide_core video_buf_dvb rfkill dvb_core lirc_atiusb libusual mac80211 tda1004x lirc_dev cfg80211 hci_usb snd_seq_midi_event input_polldev bluetooth snd_seq tuner ati_remote stir4200 irda pcspkr crc_itu_t snd_timer snd_seq_device snd soundcore psmouse parport_pc parport serio_raw hisax snd_page_alloc intel_agp iTCO_wdt saa7134 video_buf compat_ioctl32 ir_kbd_i2c i2c_core ir_common videodev v4l2_common v4l1_compat crc_ccitt shpchp pci_hotplug iTCO_vendor_support isdn slhc af_packet agpgart evdev ext3 jbd mbcache sg sd_mod sr_mod cdrom ata_piix usbhid hid via_rhine mii ohci1394 ieee1394 ehci_hcd ahci floppy ata_generic libata scsi_mod uhci_hcd usbcore thermal processor fan fuse apparmor commoncap
Dec 19 08:40:07 charlie kernel: [ 72.540669] CPU: 1
Dec 19 08:40:07 charlie kernel: [ 72.540670] EIP: 0060:[<f9069040>] Tainted: P VLI
Dec 19 08:40:07 charlie kernel: [ 72.540671] EFLAGS: 00210206 (2.6.22-14-generic #1)
Dec 19 08:40:07 charlie kernel: [ 72.540689] EIP is at nfs_fhget+0xd0/0x3e0 [nfs]
Dec 19 08:40:07 charlie kernel: [ 72.540692] eax: 00000000 ebx: 00000000 ecx: f04cbe74 edx: 00004180
Dec 19 08:40:07 charlie kernel: [ 72.540695] esi: f04cbe00 edi: f00cbbd4 ebp: f00d3128 esp: f00cbb88
Dec 19 08:40:07 charlie kernel: [ 72.540698] ds: 007b es: 007b fs: ...

Revision history for this message
Claude Boucher (bouchecl) wrote :
Download full text (9.9 KiB)

I experience the same problem described above by AZ with the newest Gutsy kernel (2.6.22-14.47, 18 dec 2007)
My setup (Dell Inspiron Desktop 531s) has been stable since I've upgraded from Feisty last month.
I mount three nfs v4 shares from a Fedora 7 server (from my /etc/fstab), and the kernel crashes at the same point. GDM executes but neither the mouse nor the keyboard works. The workstation boots fine when I comment the three NFS mounts in /etc/fstab.

From my /var/log/kern.log:

Dec 19 09:17:27 apollon kernel: [ 24.824000] bridge-eth0: enabling the bridge
Dec 19 09:17:27 apollon kernel: [ 24.824000] bridge-eth0: up
Dec 19 09:17:27 apollon kernel: [ 24.824000] bridge-eth0: already up
Dec 19 09:17:27 apollon kernel: [ 24.824000] bridge-eth0: attached
Dec 19 09:17:30 apollon kernel: [ 27.800000] NET: Registered protocol family 17
Dec 19 09:17:34 apollon kernel: [ 31.980000] BUG: unable to handle kernel NULL pointer dereference at virtual address 00000038
Dec 19 09:17:34 apollon kernel: [ 31.980000] printing eip:
Dec 19 09:17:34 apollon kernel: [ 31.980000] f8c3a040
Dec 19 09:17:34 apollon kernel: [ 31.980000] *pde = 00000000
Dec 19 09:17:34 apollon kernel: [ 31.980000] Oops: 0000 [#1]
Dec 19 09:17:34 apollon kernel: [ 31.980000] SMP
Dec 19 09:17:34 apollon kernel: [ 31.980000] Modules linked in: af_packet vmnet(P) vmblock(P) vmmon(P) ppdev ipv6 cpufreq_userspace cpufreq_powersave cpufreq_stats cpufreq_ondemand freq_table cpufreq_conservative sbs ac dock video container button battery nfs lockd sunrpc parport_pc lp parport snd_hda_intel snd_pcm_oss snd_mixer_oss snd_pcm snd_seq_dummy snd_seq_oss snd_seq_midi snd_rawmidi snd_seq_midi_event snd_seq snd_timer snd_seq_device nvidia(P) xpad snd k8temp serio_raw agpgart i2c_nforce2 pcspkr psmouse soundcore snd_page_alloc shpchp pci_hotplug i2c_core evdev ext3 jbd mbcache sg sr_mod sd_mod cdrom usbhid hid sata_nv amd74xx ide_core ata_generic forcedeth libata scsi_mod ehci_hcd ohci_hcd usbcore thermal processor fan fuse apparmor commoncap
Dec 19 09:17:34 apollon kernel: [ 31.980000] CPU: 0
Dec 19 09:17:34 apollon kernel: [ 31.980000] EIP: 0060:[<f8c3a040>] Tainted: P VLI
Dec 19 09:17:34 apollon kernel: [ 31.980000] EFLAGS: 00010206 (2.6.22-14-generic #1)
Dec 19 09:17:34 apollon kernel: [ 31.980000] EIP is at nfs_fhget+0xd0/0x3e0 [nfs]
Dec 19 09:17:34 apollon kernel: [ 31.980000] eax: 00000000 ebx: 00000000 ecx: f72f0674 edx: 00004180
Dec 19 09:17:34 apollon kernel: [ 31.980000] esi: f72f0600 edi: f6b49bd4 ebp: f6b17128 esp: f6b49b88
Dec 19 09:17:34 apollon kernel: [ 31.980000] ds: 007b es: 007b fs: 00d8 gs: 0033 ss: 0068
Dec 19 09:17:34 apollon kernel: [ 31.980000] Process mount.nfs4 (pid: 6094, ti=f6b48000 task=f717c530 task.ti=f6b48000)
Dec 19 09:17:34 apollon kernel: [ 31.980000] Stack: f8c39f10 f6b49bac 00000020 c0133462 c03d9de0 f6b17000 fffefa43 c02bd89d
Dec 19 09:17:34 apollon kernel: [ 31.980000] 00000282 f6b49c66 f6b49bd4 f6b49bd4 f72f0600 f6b49c64 f6b49d1e f8c388d7
Dec 19 09:17:34 apollon kernel: [ 31.980000] f717c6f0 c1f07000 f72f0200 00000002 00000000 00000000 00000000 00000000
Dec 19 09:1...

Revision history for this message
James Bardin (jbardin-deactivatedaccount) wrote :

Oops - forgot to repost to this bug when I found out what's going on.

Two bugs that gave me kerberized nfs problems have been fixed upstream.
To my usterstanding; one was kerberos attempting to negotiate an unsupported enctype, which triggered a second kernel bug causing the kernel oops.

The workaround for me was to set default enctypes in the krb5.conf file

 default_tkt_enctypes = DES-CBC-CRC
 default_tgs_enctypes = DES-CBC-CRC

-jim

Revision history for this message
Claude Boucher (bouchecl) wrote :

Thanks James.

However, I must say that I don't use kerberos with NFS4, so maybe the problem lies elsewhere.

Revision history for this message
Philip Walls (ubuntu-rabidgeek) wrote :

Claude and AZ,

The problem you are experiencing is in fact (embarrassingly) caused by my patch at https://bugs.launchpad.net/ubuntu/+source/linux-source-2.6.22/+bug/164231 which was included in the 2.6.22-14.47 kernel as part of a security update. This problem is unrelated to the OOPS that was originally reported by Marcel in this bug. For more details on your problem, and hopefully a fix soon, see my explanation here: https://bugs.launchpad.net/ubuntu/+source/linux-source-2.6.22/+bug/164231/comments/15 and watch that bug for updates.

Thanks,
Philip

Revision history for this message
compudaze (compudaze) wrote :

Has a corrected package with this patch been deployed yet?

Thanks,
Jared

Revision history for this message
AZ (m-dev) wrote :

In 164231 there is a nfs.ko available but since then there hasn't been a linux-image.... released - at least I didn't get one via adept.

Revision history for this message
chuinker (corey-corlogic) wrote : Re: [Bug 148600] Re: Kernel Oops with nfs4 mount

AZ wrote:
> *** This bug is a duplicate of bug 164231 ***
> https://bugs.launchpad.net/bugs/164231
>
> In 164231 there is a nfs.ko available but since then there hasn't been a
> linux-image.... released - at least I didn't get one via adept.
>
>
Copying the pre-compiled nfs.ko file provided above worked for me. Note
that it's for the -generic kernel, not the -i386 which was the default
on my machine.

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.