Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752421Ab1BUUdd (ORCPT ); Mon, 21 Feb 2011 15:33:33 -0500 Received: from mail-yi0-f46.google.com ([209.85.218.46]:56534 "EHLO mail-yi0-f46.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751242Ab1BUUdb (ORCPT ); Mon, 21 Feb 2011 15:33:31 -0500 DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:date:message-id:subject:from:to:content-type; b=c3Q2XekEAo9hnlv1qlaYY1f5kcjgWipY1sNmBbbBdQj5KcmWCznsoQuf+upibxpt/F 95FVctKwLLVHK3ogISeqV231awsvhlBnDl4VRvo74ByeBzG9Or3hGu0R9ofpEWZ1judF w3KvO1MF+owE8tZlu+Viug/BcAFAerYP91xLo= MIME-Version: 1.0 Date: Mon, 21 Feb 2011 23:33:29 +0300 Message-ID: Subject: 2.6.38-rc5: nfsd: page allocation failure. spinlock trylock failure on UP From: Alexander Beregalov To: netdev , Linux Kernel Mailing List Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 5444 Lines: 132 Hi Let me know if I can provide more info nfsd: page allocation failure. order:5, mode:0x4020 BUG: spinlock trylock failure on UP on CPU#0, nfsd/1574 lock: f6771be0, .magic: dead4ead, .owner: nfsd/1574, .owner_cpu: 0 Pid: 1574, comm: nfsd Not tainted 2.6.38-rc5-00100-g0cc9d52 #1 Call Trace: [] ? spin_bug+0x9d/0xe0 [] ? do_raw_spin_trylock+0x3a/0x40 [] ? _raw_spin_trylock+0xe/0x50 [] ? __kmalloc_track_caller+0x9a/0x170 [] ? netpoll_send_skb_on_dev+0x109/0x220 [] ? __alloc_skb+0x54/0x100 [] ? netpoll_send_udp+0x1ee/0x220 [] ? write_msg+0x9c/0xd0 [] ? write_msg+0x0/0xd0 [] ? __call_console_drivers+0x43/0x60 [] ? _call_console_drivers+0x4f/0x80 [] ? console_unlock+0xf1/0x200 [] ? vprintk+0x209/0x3b0 [] ? do_signal+0x3bd/0x870 [] ? ___ratelimit+0x85/0x100 [] ? printk+0x18/0x1a [] ? __alloc_pages_nodemask+0x405/0x620 [] ? __get_free_pages+0x1b/0x30 [] ? __kmalloc+0x152/0x170 [] ? pskb_expand_head+0x147/0x2e0 [] ? __pskb_pull_tail+0x23f/0x340 [] ? trace_hardirqs_off+0xb/0x10 [] ? dev_hard_start_xmit+0x2a2/0x570 [] ? _raw_spin_lock+0x5c/0x70 [] ? sch_direct_xmit+0x90/0x200 [] ? _raw_spin_lock+0x5c/0x70 [] ? dev_queue_xmit+0x188/0x600 [] ? dev_queue_xmit+0x0/0x600 [] ? ip_finish_output+0x133/0x400 [] ? ip_output+0x67/0xc0 [] ? ip_local_out+0x20/0x70 [] ? ip_queue_xmit+0x169/0x420 [] ? ip_queue_xmit+0x0/0x420 [] ? sched_clock_local.clone.1+0x42/0x1a0 [] ? tcp_transmit_skb+0x35c/0x810 [] ? tcp_write_xmit+0xf8/0x950 [] ? __kfree_skb+0x38/0x90 [] ? __tcp_push_pending_frames+0x27/0xb0 [] ? tcp_current_mss+0x76/0xa0 [] ? tcp_rcv_established+0x416/0x610 [] ? tcp_v4_do_rcv+0x90/0x1e0 [] ? release_sock+0x5c/0x170 [] ? release_sock+0x9d/0x170 [] ? tcp_sendpage+0x9c/0x5c0 [] ? tcp_sendpage+0x0/0x5c0 [] ? inet_sendpage+0x3f/0xa0 [] ? inet_sendpage+0x0/0xa0 [] ? kernel_sendpage+0x28/0x50 [] ? svc_send_common+0xd2/0x120 [] ? svc_sendto+0x69/0x1a0 [] ? sched_clock_cpu+0x7d/0xf0 [] ? trace_hardirqs_off+0xb/0x10 [] ? local_clock+0x46/0x60 [] ? mark_held_locks+0x56/0x80 [] ? mutex_lock_nested+0x1d9/0x2a0 [] ? mutex_lock_nested+0x1e3/0x2a0 [] ? svc_tcp_sendto+0x33/0xa0 [] ? svc_send+0x8b/0xe0 [] ? nfs3svc_release_fhandle+0x0/0x20 [] ? svc_process+0x22a/0x750 [] ? nfsd+0xa0/0x130 [] ? complete+0x48/0x60 [] ? nfsd+0x0/0x130 [] ? kthread+0x74/0x80 [] ? kthread+0x0/0x80 [] ? kernel_thread_helper+0x6/0x1c Pid: 1574, comm: nfsd Not tainted 2.6.38-rc5-00100-g0cc9d52 #1 Call Trace: [] ? __alloc_pages_nodemask+0x40a/0x620 [] ? __get_free_pages+0x1b/0x30 [] ? __kmalloc+0x152/0x170 [] ? pskb_expand_head+0x147/0x2e0 [] ? __pskb_pull_tail+0x23f/0x340 [] ? trace_hardirqs_off+0xb/0x10 [] ? dev_hard_start_xmit+0x2a2/0x570 [] ? _raw_spin_lock+0x5c/0x70 [] ? sch_direct_xmit+0x90/0x200 [] ? _raw_spin_lock+0x5c/0x70 [] ? dev_queue_xmit+0x188/0x600 [] ? dev_queue_xmit+0x0/0x600 [] ? ip_finish_output+0x133/0x400 [] ? ip_output+0x67/0xc0 [] ? ip_local_out+0x20/0x70 [] ? ip_queue_xmit+0x169/0x420 [] ? ip_queue_xmit+0x0/0x420 [] ? sched_clock_local.clone.1+0x42/0x1a0 [] ? tcp_transmit_skb+0x35c/0x810 [] ? tcp_write_xmit+0xf8/0x950 [] ? __kfree_skb+0x38/0x90 [] ? __tcp_push_pending_frames+0x27/0xb0 [] ? tcp_current_mss+0x76/0xa0 [] ? tcp_rcv_established+0x416/0x610 [] ? tcp_v4_do_rcv+0x90/0x1e0 [] ? release_sock+0x5c/0x170 [] ? release_sock+0x9d/0x170 [] ? tcp_sendpage+0x9c/0x5c0 [] ? tcp_sendpage+0x0/0x5c0 [] ? inet_sendpage+0x3f/0xa0 [] ? inet_sendpage+0x0/0xa0 [] ? kernel_sendpage+0x28/0x50 [] ? svc_send_common+0xd2/0x120 [] ? svc_sendto+0x69/0x1a0 [] ? sched_clock_cpu+0x7d/0xf0 [] ? trace_hardirqs_off+0xb/0x10 [] ? local_clock+0x46/0x60 [] ? mark_held_locks+0x56/0x80 [] ? mutex_lock_nested+0x1d9/0x2a0 [] ? mutex_lock_nested+0x1e3/0x2a0 [] ? svc_tcp_sendto+0x33/0xa0 [] ? svc_send+0x8b/0xe0 [] ? nfs3svc_release_fhandle+0x0/0x20 [] ? svc_process+0x22a/0x750 [] ? nfsd+0xa0/0x130 [] ? complete+0x48/0x60 [] ? nfsd+0x0/0x130 [] ? kthread+0x74/0x80 [] ? kthread+0x0/0x80 [] ? kernel_thread_helper+0x6/0x1c -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/