Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S267251AbUJRSd7 (ORCPT ); Mon, 18 Oct 2004 14:33:59 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S267415AbUJRSa2 (ORCPT ); Mon, 18 Oct 2004 14:30:28 -0400 Received: from websrv2.werbeagentur-aufwind.de ([213.239.197.240]:24983 "EHLO websrv2.werbeagentur-aufwind.de") by vger.kernel.org with ESMTP id S267251AbUJRS16 (ORCPT ); Mon, 18 Oct 2004 14:27:58 -0400 Subject: NFS4 client deadlock with 2.6.9-rc3-mm4 based kernel From: Christophe Saout To: linux-kernel@vger.kernel.org Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="=-NxSsi72WqiTWttrlABLN" Date: Mon, 18 Oct 2004 20:27:46 +0200 Message-Id: <1098124066.13075.5.camel@leto.cs.pocnet.net> Mime-Version: 1.0 X-Mailer: Evolution 2.0.2 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 5440 Lines: 140 --=-NxSsi72WqiTWttrlABLN Content-Type: text/plain Content-Transfer-Encoding: quoted-printable Hi, I've managed to lock up the nfs4 client code in an nfs4 chroot environment. I'm not sure but it seems that __rpc_execute has a problem when called recursively...? The kernel is mostly a 2.6.9-rc3-mm4, but Ingo's BKL-semaphore patch has been omitted. This kernel hasn't shown any other lockups since -rc3-mm4 was released on several machines (all UP, PREEMPT) so I'm assuming it's not my fault, please tell me if I'm wrong. This is SysRq-T trace of all processes involved in the lockup: rpciod/0 D C986C000 0 14500 5 722 (L-TLB) c986dcfc 00000046 00000000 c986c000 00000000 cfcc6a00 00000282 c041abd4=20 00000000 cf8334c0 cfcc6ad0 00000000 04d1a300 000f4406 c57f51b0 cf8334c0=20 c986dd48 cf83354c c986dd74 c041b225 ca0ca780 00000000 ca0cab00 c986c000=20 Call Trace: [] __rpc_execute+0x1b5/0x460 [] rpc_call_sync+0x87/0xa0 [] _nfs4_do_close+0xb7/0xf0 [] nfs4_do_close+0x53/0x90 [] nfs4_close_state+0x15a/0x170 [] put_nfs_open_context+0x3c/0x50 [] nfs_release_request+0x2a/0x50 [] nfs_readpage_release+0x2e/0xb0 [] nfs_readpage_result_full+0xc2/0x120 [] nfs_readpage_result+0x7c/0xf0 [] __rpc_execute+0x351/0x460 [] worker_thread+0x19b/0x260 [] kthread+0x8a/0xd0 [] kernel_thread_helper+0x5/0x10 emerge D C049DBD0 0 18162 14532 19786 (L-TLB) c5d1bd80 00200046 c1020000 c049dbd0 00200082 c049dc70 ffffffff c049db84=20 a309d21d 000f441a cde8c060 000f4240 a95de000 000f441a cd9121b0 c9ffbb50=20 00200246 c5d1a000 c5d1bdbc c042cc9a c9ffbb58 cd912060 00000001 cd912060=20 Call Trace: [] __down+0x7a/0x110 [] __down_failed+0xb/0x14 [] .text.lock.nfs4state+0x13/0x65 [] put_nfs_open_context+0x3c/0x50 [] nfs4_proc_file_release+0x13/0x30 [] nfs_file_release+0x15/0x20 [] __fput+0x107/0x140 [] remove_vm_struct+0x65/0xa0 [] exit_mmap+0x10f/0x140 [] mmput+0x35/0xa0 [] do_exit+0x107/0x430 [] do_group_exit+0x36/0xa0 [] get_signal_to_deliver+0x206/0x390 [] do_signal+0x68/0x120 [] do_notify_resume+0x39/0x3c [] work_notifysig+0x13/0x15 sh D C049DBD0 0 19786 18162 19787 (L-TLB) c1705d80 00200046 c1020000 c049dbd0 00200082 c049dc70 ffffffff c049db84=20 c049db84 c11b1dc0 c1704000 00000000 a95de000 000f441a cde8c1b0 c9ffbb50=20 00200246 c1704000 c1705dbc c042cc9a c9ffbb58 cde8c060 00000001 cde8c060=20 Call Trace: [] __down+0x7a/0x110 [] __down_failed+0xb/0x14 [] .text.lock.nfs4state+0x13/0x65 [] put_nfs_open_context+0x3c/0x50 [] nfs4_proc_file_release+0x13/0x30 [] nfs_file_release+0x15/0x20 [] __fput+0x107/0x140 [] remove_vm_struct+0x65/0xa0 [] exit_mmap+0x10f/0x140 [] mmput+0x35/0xa0 [] do_exit+0x107/0x430 [] do_group_exit+0x36/0xa0 [] get_signal_to_deliver+0x206/0x390 [] do_signal+0x68/0x120 [] do_notify_resume+0x39/0x3c [] work_notifysig+0x13/0x15 ldconfig D 0000000E 0 19787 19786 (NOTLB) c6e4bdc0 00200086 00200082 0000000e cfcbda00 c6e4be34 c09ac894 c6e4bd9c=20 c612d580 c6e4bd9c c6e4bd9c 00000000 04484ec0 000f4406 c9963bf0 c6e4be1c=20 c6e4be24 c11ff318 c6e4bdc8 c042d84e c6e4bdd0 c013d4b5 c6e4bdec c042db28=20 Call Trace: [] io_schedule+0xe/0x20 [] sync_page+0x35/0x60 [] __wait_on_bit_lock+0x48/0x70 [] __lock_page+0x87/0xa0 [] filemap_nopage+0x27b/0x320 [] do_no_page+0xa0/0x2b0 [] handle_mm_fault+0x152/0x1a0 [] do_page_fault+0x435/0x5f1 [] error_code+0x2d/0x38 ls D CA34E000 0 19801 1 19803 14886 (NOTLB) ca34fcb4 00200082 00000000 ca34e000 00000000 cfcc6a00 00200286 c041abd4=20 00000000 cf833dc0 cfcc6ad0 00000000 97c10c00 000f440b cd292750 cf833dc0=20 ca34fd00 cf833e4c ca34fd2c c041b225 00000000 cd292600 c01332e0 ca34e000=20 Call Trace: [] __rpc_execute+0x1b5/0x460 [] rpc_call_sync+0x87/0xa0 [] _nfs4_proc_access+0x93/0x100 [] nfs4_proc_access+0x29/0x50 [] nfs_do_access+0x4c/0x90 [] nfs_permission+0xe7/0x180 [] permission+0x3b/0x50 [] link_path_walk+0x397/0xd70 [] vfs_follow_link+0x2f/0x1a0 [] link_path_walk+0x262/0xd70 [] path_lookup+0x89/0x1a0 [] __user_walk+0x2d/0x70 [] vfs_lstat+0x1d/0x60 [] sys_lstat64+0x14/0x30 [] sysenter_past_esp+0x52/0x71 --=-NxSsi72WqiTWttrlABLN Content-Type: application/pgp-signature; name=signature.asc Content-Description: Dies ist ein digital signierter Nachrichtenteil -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (GNU/Linux) iD8DBQBBdAsiZCYBcts5dM0RAvU1AJ0RhuHV68k0RNSY9XmeF89rKlNkuQCfVv0Q 6aJGkpDZ6m1fQiA7Si/IGEo= =QGRp -----END PGP SIGNATURE----- --=-NxSsi72WqiTWttrlABLN-- - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/