OOPs warning and dumpstack in nfsd - nfsd4_process_open2 failed to open newly-created file! status=10008

Solution In Progress - Updated -

Issue

OOps message and dumpstack for nfsd4_process_open2 call failure - on NFS server

WARNING: CPU: 15 PID: 2149 at fs/nfsd/nfs4proc.c:449 nfsd4_open+0x588/0x840 [nfsd]
nfsd4_process_open2 failed to open newly-created file! status=10008                     << 
Modules linked in: rpcsec_gss_krb5 binfmt_misc 8021q garp mrp ip6t_rpfilter ipt_REJECT nf_reject_ipv4 ip6t_REJECT nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge stp llc ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ib_isert iscsi_target_mod ib_srpt target_core_mod ib_srp scsi_transport_srp scsi_tgt ib_ucm dm_mirror dm_region_hash dm_log rpcrdma rdma_ucm ib_uverbs ib_iser ib_umad rdma_cm iw_cm ib_ipoib libiscsi scsi_transport_iscsi ib_cm sb_edac intel_powerclamp coretemp intel_rapl iosf_mbi dm_mod kvm_intel kvm mlx5_ib
irqbypass crc32_pclmul ib_core ghash_clmulni_intel iTCO_wdt iTCO_vendor_support aesni_intel lrw gf128mul glue_helper ablk_helper cryptd pcspkr ses enclosure scsi_transport_sas joydev sg mei_me ioatdma mei i2c_i801 lpc_ich shpchp ipmi_ssif mxm_wmi ipmi_si ipmi_devintf ipmi_msghandler wmi acpi_power_meter acpi_pad nfsd nfs_acl lockd auth_rpcgss grace sunrpc ip_tables xfs libcrc32c raid1 sd_mod crc_t10dif crct10dif_generic ast i2c_algo_bit drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm mlx5_core drm ahci ixgbe libahci libata crct10dif_pclmul crct10dif_common crc32c_intel mlxfw megaraid_sas devlink i2c_core mdio ptp pps_core dca
CPU: 15 PID: 2149 Comm: nfsd Kdump: loaded Not tainted 3.10.0-862.14.4.el7.x86_64 #1
Hardware name: Supermicro X10DRH/X10DRH-CT, BIOS 3.0a 02/05/2018
Call Trace:
[<ffffffffbdb13754>] dump_stack+0x19/0x1b
[<ffffffffbd4945d8>] __warn+0xd8/0x100
[<ffffffffbd49465f>] warn_slowpath_fmt+0x5f/0x80
[<ffffffffc05b905b>] ? nfs4_free_ol_stateid+0x3b/0x40 [nfsd]
[<ffffffffc05ac278>] nfsd4_open+0x588/0x840 [nfsd]
[<ffffffffc05ac90d>] nfsd4_proc_compound+0x3dd/0x780 [nfsd]
[<ffffffffc0597590>] nfsd_dispatch+0xe0/0x290 [nfsd]
[<ffffffffc0509866>] svc_process_common+0x466/0x710 [sunrpc]
[<ffffffffc0509c13>] svc_process+0x103/0x190 [sunrpc]
[<ffffffffc0596eef>] nfsd+0xdf/0x150 [nfsd]
[<ffffffffc0596e10>] ? nfsd_destroy+0x80/0x80 [nfsd]
[<ffffffffbd4bdf21>] kthread+0xd1/0xe0
[<ffffffffbd4bde50>] ? insert_kthread_work+0x40/0x40
[<ffffffffbdb255f7>] ret_from_fork_nospec_begin+0x21/0x21
[<ffffffffbd4bde50>] ? insert_kthread_work+0x40/0x40

Environment

  • Red Hat enterprise Linux 7.5
    -kernel 3.10.0-862.14.4.el7.x86_64
  • RHEL NFS Server

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content