RHEL5.8: AMD with "mount_type = autofs" causes kernel panic with RIP managed_dentry
Issue
- Kernel crash in
managed_dentryorKernel BUG at fs/namei.c:804 - After upgrading some systems to kernel 2.6.18-308, we discovered that AMD (via package am-utils) would cause a kernel panic when run with the option "mount_type = autofs".
Kernel BUG at fs/namei.c:804
invalid opcode: 0000 [1] SMP
last sysfs file: /kernel/kexec_crash_loaded
CPU 1
Modules linked in: nfs nfs_acl autofs4 hidp rfcomm l2cap bluetooth lockd sunrpc be2iscsi ib_iser rdma_cm ib_cm iw_cm ib_sa
ib_mad ib_core ib_addr iscsi_tcp bnx2i cnic ipv6 xfrm_nalgo crypto_api uio cxgb3i libcxgbi cxgb3 8021q libiscsi_tcp
libiscsi2 scsi_transport_iscsi2 scsi_transport_iscsi dm_multipath scsi_dh video backlight sbs power_meter hwmon i2c_ec
dell_wmi wmi button battery asus_acpi acpi_memhotplug ac lp sg ide_cd tpm_tis i2c_piix4 tpm floppy parport_pc pcnet32
mii cdrom i2c_core tpm_bios parport serio_raw shpchp pcspkr dm_raid45 dm_message dm_region_hash dm_mem_cache dm_snapshot
dm_zero dm_mirror dm_log dm_mod ata_piix libata mptspi mptscsih mptbase scsi_transport_spi sd_mod scsi_mod ext3 jbd
uhci_hcd ohci_hcd ehci_hcd
Pid: 3495, comm: bash Not tainted 2.6.18-308.11.1.el5 #1
RIP: 0010:[<ffffffff800eb924>] [<ffffffff800eb924>] managed_dentry+0x40/0x214
RSP: 0018:ffff81022df63c18 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: ffff810230521738 RSI: 0000000007a2e878 RDI: ffff810230521740
RBP: ffff81022df63cb8 R08: ffff81022df62000 R09: 000000000000003f
R10: ffff810107f90008 R11: 0000000000000080 R12: 0000000020000000
R13: 0000000000000000 R14: 0000000000000005 R15: ffff81022df63ca8
FS: 00002b4ff6bc3f50(0000) GS:ffff810107f427c0(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 00000000006b2868 CR3: 00000002301ea000 CR4: 00000000000006a0
Process bash (pid: 3495, threadinfo ffff81022df62000, task ffff81023fdc6080)
Stack: ffff810230521738 0000000000000000 ffff81023fc10b40 ffff81023fc10bf8
ffff81022df63e48 ffffffff8000cfdf 0000000000000000 ffff81022df63cb8
ffff81023d0fd880 ffff81022df63e48 0000000000000101 ffff81023fc10b40
Call Trace:
[<ffffffff8000cfdf>] do_lookup+0x69/0x227
[<ffffffff80009c52>] __link_path_walk+0x3a3/0xf25
[<ffffffff8000eb23>] link_path_walk+0x45/0xb8
[<ffffffff8000a54b>] __link_path_walk+0xc9c/0xf25
[<ffffffff8000eb23>] link_path_walk+0x45/0xb8
[<ffffffff8000cdf6>] do_path_lookup+0x294/0x310
[<ffffffff80012955>] getname+0x15b/0x1c2
[<ffffffff800239f8>] __user_walk_fd+0x37/0x4c
[<ffffffff80028973>] vfs_stat_fd+0x1b/0x4a
[<ffffffff80067235>] do_page_fault+0x4cc/0x842
[<ffffffff80028e18>] do_sigaction+0x76/0x199
[<ffffffff80023728>] sys_newstat+0x19/0x31
[<ffffffff8005d229>] tracesys+0x71/0xe0
[<ffffffff8005d28d>] tracesys+0xd5/0xe0
Code: 0f 0b 68 af 16 2c 80 c2 24 03 eb fe 31 f6 48 89 ef ff d0 85
RIP [<ffffffff800eb924>] managed_dentry+0x40/0x214
RSP <ffff81022df63c18>
Environment
- Red Hat Enterprise Linux 5.8
- kernel-2.6.18-308.11.1.el5
- kernel-2.6.18-308.el5
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.