Received: by 2002:a17:90a:b81:0:0:0:0 with SMTP id 1csp4983291pjr; Mon, 26 Aug 2019 16:14:01 -0700 (PDT) X-Google-Smtp-Source: APXvYqz68i5Akqo14stoApsukjAFATmB03dySSOvugz86OB5rzi0Nkf8dP/DQpvgkI/bPYdc2e9m X-Received: by 2002:a17:90a:9ea:: with SMTP id 97mr21700818pjo.68.1566861241293; Mon, 26 Aug 2019 16:14:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566861241; cv=none; d=google.com; s=arc-20160816; b=WTRkmEPXaL+gXt0jpT8yPSSKsSC7fefc5j0TsIYQXVAWoywQdrBI6oeos2YjWK8w0R pijPj1XQWTqoySDEfR0CAPmVFU91TvYhN+lbMPZZI4+QlfECAr6V1n9p18MrVO0WVTHq cv1yxQOh7CD9s0fa7iGnBUhcCjvPsxRpawLLqmxYRypExhsugwK019Znv+8gO5uByR4g VXPC4+8MxQa9kNrJXJa5q6nvDDo95jH1H6QnzjejQ8LqhYKX10XJj+AtdoVrZsEn2J9C Bl8lBX88gji4bSgB4DOZrMHPkkKgkakgQLwPLt97cv6I8HFVqcTNxsI2xZrCCmF3cuIJ iQ5A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:thread-index:thread-topic :content-transfer-encoding:mime-version:subject:references :in-reply-to:message-id:cc:to:from:date; bh=p6XsXuWE3l5G+QicsO86bRuLbtgrhWfRcHD+DpUQG60=; b=j9AV6aV5I2vuLuDBRtVB9Cj3Gx8u0DG1B4LhB3cDboWt+Ak6DbpziXZKcSoq6OiYOB 648NQdfz6frHx8mmRfxhZt13emlsdkOW1ybgO6zYwhlI0tws7FF/zDD0U0VQ99gv1PEs nAGFrOT+3FamVfkH531Ys5BcjtdZ2EzxyI6WLtji3AZ0GNV7WRCYivA5jnmTeiew0OvV d3eE0C1YCw1lfI8E8BE6Y/TOR2Q4/3P6uNY1mFym9DmvfJ/bDwB/OI/46us51WE4y6yN bowvBxLBYoUzGiqEDS6ORlXJGVvDU3lJ5Ai9pfARGIzqDz3Rp/aR3CnJqraP6LRwM5f5 Hjsw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 73si11184682pfa.123.2019.08.26.16.13.43; Mon, 26 Aug 2019 16:14:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726606AbfHZXMy (ORCPT + 99 others); Mon, 26 Aug 2019 19:12:54 -0400 Received: from mx1.redhat.com ([209.132.183.28]:49726 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726307AbfHZXMy (ORCPT ); Mon, 26 Aug 2019 19:12:54 -0400 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 91C31C00A166; Mon, 26 Aug 2019 23:12:53 +0000 (UTC) Received: from colo-mx.corp.redhat.com (colo-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.20]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 7050E196AE; Mon, 26 Aug 2019 23:12:53 +0000 (UTC) Received: from zmail17.collab.prod.int.phx2.redhat.com (zmail17.collab.prod.int.phx2.redhat.com [10.5.83.19]) by colo-mx.corp.redhat.com (Postfix) with ESMTP id 1C15C18005A0; Mon, 26 Aug 2019 23:12:52 +0000 (UTC) Date: Mon, 26 Aug 2019 19:12:52 -0400 (EDT) From: Jan Stancek To: Trond Myklebust Cc: naresh kamboju , the hoang0709 , linux-next@vger.kernel.org, ltp@lists.linux.it, linux-kernel@vger.kernel.org, chrubis@suse.cz, alexey kodanev Message-ID: <2039173876.8300255.1566861172742.JavaMail.zimbra@redhat.com> In-Reply-To: References: <20190826104127.GA14729@haruka> <1264279239.8133737.1566817520787.JavaMail.zimbra@redhat.com> <203971593.8175020.1566830285708.JavaMail.zimbra@redhat.com> Subject: Re: Linux-next-20190823: x86_64/i386: prot_hsymlinks.c:325: Failed to run cmd: useradd hsym MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-Originating-IP: [10.40.205.130, 10.4.195.29] Thread-Topic: Linux-next-20190823: x86_64/i386: prot_hsymlinks.c:325: Failed to run cmd: useradd hsym Thread-Index: YFeV1UC3LeIsRdovt5+kMdO7I/BycvuMo5UAj4lK/k0= X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.32]); Mon, 26 Aug 2019 23:12:53 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ----- Original Message ----- > On Mon, 2019-08-26 at 10:38 -0400, Jan Stancek wrote: > > ----- Original Message ----- > > > Hi Jan and Cyril, > > > > > > On Mon, 26 Aug 2019 at 16:35, Jan Stancek > > > wrote: > > > > > > > > > > > > ----- Original Message ----- > > > > > Hi! > > > > > > Do you see this LTP prot_hsymlinks failure on linux next > > > > > > 20190823 on > > > > > > x86_64 and i386 devices? > > > > > > > > > > > > test output log, > > > > > > useradd: failure while writing changes to /etc/passwd > > > > > > useradd: /home/hsym was created, but could not be removed > > > > > > > > > > This looks like an unrelated problem, failure to write to > > > > > /etc/passwd > > > > > probably means that filesystem is full or some problem happend > > > > > and how > > > > > is remounted RO. > > > > > > > > In Naresh' example, root is on NFS: > > > > root=/dev/nfs rw > > > > > > > > nfsroot=10.66.16.123:/var/lib/lava/dispatcher/tmp/886412/extract- > > > > nfsrootfs-tyuevoxm,tcp,hard,intr > > > > > > Right ! > > > root is mounted on NFS. > > > > > > > 10.66.16.123:/var/lib/lava/dispatcher/tmp/886412/extract- > > > > nfsrootfs-tyuevoxm > > > > on / type nfs > > > > (rw,relatime,vers=2,rsize=4096,wsize=4096,namlen=255,hard,nolock, > > > > proto=tcp,timeo=600,retrans=2,sec=sys,mountaddr=10.66.16.123,moun > > > > tvers=1,mountproto=tcp,local_lock=all,addr=10.66.16.123) > > > > devtmpfs on /dev type devtmpfs > > > > (rw,relatime,size=3977640k,nr_inodes=994410,mode=755) > > > > > > The only thing I can think of that might cause an EIO on NFSv2 would be > this patch > http://git.linux-nfs.org/?p=trondmy/linux-nfs.git;a=commitdiff;h=627d48e597ec5993c4abb3b81dc75e554a07c7c0 > assuming that a bind-related error is leaking through. > > I'd suggest something like the following to fix it up: No change with that patch, but following one fixes it for me: diff --git a/fs/nfs/pagelist.c b/fs/nfs/pagelist.c index 20b3717cd7ca..56cefa0ab804 100644 --- a/fs/nfs/pagelist.c +++ b/fs/nfs/pagelist.c @@ -590,7 +590,7 @@ static void nfs_pgio_rpcsetup(struct nfs_pgio_header *hdr, } hdr->res.fattr = &hdr->fattr; - hdr->res.count = 0; + hdr->res.count = count; hdr->res.eof = 0; hdr->res.verf = &hdr->verf; nfs_fattr_init(&hdr->fattr); which is functionally revert of "NFS: Fix initialisation of I/O result struct in nfs_pgio_rpcsetup". This hunk caught my eye, could res.eof == 0 explain those I/O errors? /* Emulate the eof flag, which isn't normally needed in NFSv2 * as it is guaranteed to always return the file attributes */ if (hdr->args.offset + hdr->res.count >= hdr->res.fattr->size) hdr->res.eof = 1;