Return-Path: Received: from galahad.ideasonboard.com ([185.26.127.97]:54903 "EHLO galahad.ideasonboard.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754767AbbLDWxO (ORCPT ); Fri, 4 Dec 2015 17:53:14 -0500 From: Laurent Pinchart To: linux-kernel@vger.kernel.org, linux-nfs@vger.kernel.org, netdev@vger.kernel.org Subject: NFS issue on v4.4-rc3 Date: Sat, 05 Dec 2015 00:53:24 +0200 Message-ID: <21970607.rdfIyEsdfn@avalon> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: linux-nfs-owner@vger.kernel.org List-ID: Hello, I ran into the following warning when running v4.4-rc3 on a TI OMAP4 (pandaboard) using nfsroot. [ 8063.208526] ------------[ cut here ]------------ [ 8063.213653] WARNING: CPU: 1 PID: 81 at net/ipv4/af_inet.c:155 inet_sock_destruct+0x188/0x1dc() [ 8063.213653] Modules linked in: vivid cfbfillrect cfbimgblt font videobuf2_dma_contig videobuf2_memops cfbcopyarea videobuf2_v4l2 videobuf2_core fb omapdrm drm_kms_helper drm snd_soc_omap_abe_twl6040 e [ 8063.253143] CPU: 1 PID: 81 Comm: kworker/1:1H Not tainted 4.4.0-rc3-00249- g8555fa61a7ca-dirty #347 [ 8063.269317] Hardware name: Generic OMAP4 (Flattened Device Tree) [ 8063.275634] Workqueue: rpciod xprt_autoclose [ 8063.275634] [] (unwind_backtrace) from [] (show_stack+0x10/0x14) [ 8063.288391] [] (show_stack) from [] (dump_stack+0x80/0x9c) [ 8063.296020] [] (dump_stack) from [] (warn_slowpath_common+0x7c/0xb8) [ 8063.296020] [] (warn_slowpath_common) from [] (warn_slowpath_null+0x1c/0x24) [ 8063.313812] [] (warn_slowpath_null) from [] (inet_sock_destruct+0x188/0x1dc) [ 8063.323059] [] (inet_sock_destruct) from [] (sk_destruct+0x18/0x174) [ 8063.331604] [] (sk_destruct) from [] (inet_release+0x44/0x70) [ 8063.339508] [] (inet_release) from [] (sock_release+0x20/0xb8) [ 8063.347503] [] (sock_release) from [] (xs_close+0xc/0x20) [ 8063.355041] [] (xs_close) from [] (xprt_autoclose+0x30/0x64) [ 8063.362854] [] (xprt_autoclose) from [] (process_one_work+0x1b4/0x4ac) [ 8063.371551] [] (process_one_work) from [] (worker_thread+0x154/0x470) [ 8063.380187] [] (worker_thread) from [] (kthread+0xd0/0xec) [ 8063.387817] [] (kthread) from [] (ret_from_fork+0x14/0x24) [ 8063.395446] ---[ end trace 6ced06624a647c32 ]--- The problem occurred twice only over several hours and wasn't linked to any particular operation. Before the first occurrence I also got errors printed right after boot on both the client and the server side kernel logs. The server side read as follows. [72948.929645] oversized read request from 192.168.1.254, port=938 (1426618135 bytes) [72954.726793] oversized read request from 192.168.1.254, port=938 (67248960 bytes) I'm afraid the client messages have been lost in my scroll buffer, but they were related to the to oversized requests as well. I've been running the same setup on v4.3 without any issue for quite a long time. -- Regards, Laurent Pinchart