Return-Path: linux-nfs-owner@vger.kernel.org Received: from gw1.transmode.se ([195.58.98.146]:50951 "EHLO gw1.transmode.se" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S964810Ab3DOIl0 (ORCPT ); Mon, 15 Apr 2013 04:41:26 -0400 Received: from mail1.transmode.se (mail1.transmode.se [192.168.201.18]) by gw1.transmode.se (Postfix) with ESMTP id 89BAE258020 for ; Mon, 15 Apr 2013 10:41:24 +0200 (CEST) In-Reply-To: References: Cc: linux-nfs@vger.kernel.org MIME-Version: 1.0 Subject: Re: NFS loop on 3.4.39 From: Joakim Tjernlund Message-ID: Date: Mon, 15 Apr 2013 10:41:23 +0200 Content-Type: text/plain; charset="US-ASCII" To: unlisted-recipients:; (no To-header on input) Sender: linux-nfs-owner@vger.kernel.org List-ID: hmm, I got another log which i a little different: 16:01:48.478917 IP 172.20.4.10.3676268197 > 192.168.201.44.nfs: 272 getattr fh 0,0/22 16:01:48.479352 IP 192.168.201.44.nfs > 172.20.4.10.3676268197: reply ok 52 getattr ERROR: unk 10025 16:01:48.479394 IP 172.20.4.10.3693045413 > 192.168.201.44.nfs: 272 getattr fh 0,0/22 16:01:48.479761 IP 192.168.201.44.nfs > 172.20.4.10.3693045413: reply ok 52 getattr ERROR: unk 10025 16:01:48.479887 IP 172.20.4.10.3709822629 > 192.168.201.44.nfs: 272 getattr fh 0,0/22 16:01:48.480316 IP 192.168.201.44.nfs > 172.20.4.10.3709822629: reply ok 52 getattr ERROR: unk 10025 16:01:48.480415 IP 172.20.4.10.3726599845 > 192.168.201.44.nfs: 272 getattr fh 0,0/22 16:01:48.480760 IP 192.168.201.44.nfs > 172.20.4.10.3726599845: reply ok 52 getattr ERROR: unk 10025 16:01:48.480882 IP 172.20.4.10.3743377061 > 192.168.201.44.nfs: 272 getattr fh 0,0/22 16:01:48.481554 IP 192.168.201.44.nfs > 172.20.4.10.3743377061: reply ok 52 getattr ERROR: unk 10025 16:01:48.481652 IP 172.20.4.10.3760154277 > 192.168.201.44.nfs: 272 getattr fh 0,0/22 16:01:48.482002 IP 192.168.201.44.nfs > 172.20.4.10.3760154277: reply ok 52 getattr ERROR: unk 10025 16:01:48.482085 IP 172.20.4.10.3776931493 > 192.168.201.44.nfs: 272 getattr fh 0,0/22 16:01:48.482452 IP 192.168.201.44.nfs > 172.20.4.10.3776931493: reply ok 52 getattr ERROR: unk 10025 16:01:48.482537 IP 172.20.4.10.3793708709 > 192.168.201.44.nfs: 272 getattr fh 0,0/22 16:01:48.482937 IP 192.168.201.44.nfs > 172.20.4.10.3793708709: reply ok 52 getattr ERROR: unk 10025 16:01:48.483050 IP 172.20.4.10.3810485925 > 192.168.201.44.nfs: 272 getattr fh 0,0/22 16:01:48.483399 IP 192.168.201.44.nfs > 172.20.4.10.3810485925: reply ok 52 getattr ERROR: unk 10025 16:01:48.483439 IP 172.20.4.10.3827263141 > 192.168.201.44.nfs: 272 getattr fh 0,0/22 16:01:48.483803 IP 192.168.201.44.nfs > 172.20.4.10.3827263141: reply ok 52 getattr ERROR: unk 10025 This is with a somewhat older kernel though: 3.4.35 The NFS sever is running 3.4.39 in both cases. Joakim Tjernlund/Transmode wrote on 2013/04/15 10:19:39: > From: Joakim Tjernlund/Transmode > To: linux-nfs@vger.kernel.org, > Date: 2013/04/15 10:19 > Subject: NFS loop on 3.4.39 > > I get som NFS loop which generates lots of (from tcpdump): > 9:48:43.156252 IP 192.168.201.44.nfs > 172.20.4.10.con: Flags [.], ack > 8406616, win 32885, options [nop,nop,TS val 43795665 ecr 57419706], length 0 > 09:48:43.156258 IP 192.168.201.44.nfs > 172.20.4.10.con: Flags [.], ack > 8426888, win 32885, options [nop,nop,TS val 43795665 ecr 57419706], length 0 > 09:48:43.156669 IP 192.168.201.44.nfs > 172.20.4.10.con: Flags [.], ack > 8445712, win 32885, options [nop,nop,TS val 43795665 ecr 57419706], length 0 > 09:48:43.156675 IP 192.168.201.44.nfs > 172.20.4.10.con: Flags [.], ack > 8459880, win 32883, options [nop,nop,TS val 43795665 ecr 57419706], length 0 > 09:48:43.156679 IP 192.168.201.44.nfs > 172.20.4.10.2889942938: reply ok 52 > getattr ERROR: unk 10024 > 09:48:43.156704 IP 172.20.4.10.2923497370 > 192.168.201.44.nfs: 2892 getattr fh 0,0/22 > 09:48:43.156712 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8462776:8467120, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.156719 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8467120:8471464, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.156725 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8471464:8475808, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.156731 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8475808:8480152, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.156745 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8480152:8484496, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.156748 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8484496:8487392, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 2896 > 09:48:43.156751 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8487392:8491736, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.156755 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8491736:8496080, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.156758 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8496080:8500424, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.156764 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8500424:8504768, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.156767 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8504768:8509112, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.156770 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8509112:8512008, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 2896 > 09:48:43.156773 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8512008:8516352, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.156778 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8516352:8520696, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.156956 IP 192.168.201.44.nfs > 172.20.4.10.2906720154: reply ok 52 > getattr ERROR: unk 10024 > 09:48:43.156969 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8520696:8525040, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.156975 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8525040:8529384, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.156980 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8529384:8533728, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.156984 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8533728:8536624, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 2896 > 09:48:43.156988 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8536624:8540968, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.156994 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8540968:8545312, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.156999 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8545312:8549656, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.157209 IP 192.168.201.44.nfs > 172.20.4.10.con: Flags [.], ack > 8464224, win 32872, options [nop,nop,TS val 43795665 ecr 57419706], length 0 > 09:48:43.157219 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8549656:8554000, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.157225 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8554000:8558344, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.157230 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [P.], seq > 8558344:8558424, ack 9577, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 80 > 09:48:43.157235 IP 172.20.4.10.2940274586 > 192.168.201.44.nfs: 532 getattr fh 0,0/22 > 09:48:43.157460 IP 192.168.201.44.nfs > 172.20.4.10.con: Flags [.], ack > 8485944, win 32885, options [nop,nop,TS val 43795665 ecr 57419706], length 0 > 09:48:43.157709 IP 192.168.201.44.nfs > 172.20.4.10.con: Flags [.], ack > 8504768, win 32885, options [nop,nop,TS val 43795665 ecr 57419706], length 0 > 09:48:43.157715 IP 192.168.201.44.nfs > 172.20.4.10.con: Flags [.], ack > 8526488, win 32885, options [nop,nop,TS val 43795665 ecr 57419706], length 0 > 09:48:43.158126 IP 192.168.201.44.nfs > 172.20.4.10.con: Flags [.], ack > 8543864, win 32885, options [nop,nop,TS val 43795665 ecr 57419706], length 0 > 09:48:43.158133 IP 192.168.201.44.nfs > 172.20.4.10.con: Flags [.], ack > 8558960, win 32883, options [nop,nop,TS val 43795665 ecr 57419706], length 0 > 09:48:43.158138 IP 192.168.201.44.nfs > 172.20.4.10.2923497370: reply ok 52 > getattr ERROR: unk 10024 > 09:48:43.158143 IP 192.168.201.44.nfs > 172.20.4.10.2940274586: reply ok 52 > getattr ERROR: unk 10024 > 09:48:43.158149 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], ack 9745, > win 23907, options [nop,nop,TS val 57419706 ecr 43795665], length 0 > 09:48:43.158174 IP 172.20.4.10.2957051802 > 192.168.201.44.nfs: 2892 getattr fh 0,0/22 > 09:48:43.158192 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8561856:8566200, ack 9745, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.158197 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8566200:8570544, ack 9745, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.158204 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8570544:8574888, ack 9745, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.158210 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8574888:8579232, ack 9745, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.158216 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8579232:8583576, ack 9745, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.158222 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8583576:8586472, ack 9745, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 2896 > 09:48:43.158226 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8586472:8590816, ack 9745, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.158233 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8590816:8595160, ack 9745, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > 09:48:43.158239 IP 172.20.4.10.con > 192.168.201.44.nfs: Flags [.], seq > 8595160:8599504, ack 9745, win 23907, options [nop,nop,TS val 57419706 ecr > 43795665], length 4344 > > I wonder if this is a variant on: > https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/ > fs/nfs/nfs4proc.c?h=linux-3.6.y&id=9fa2b82e5592a7aa7a63b7f6a32c5aa9e580643a > > which does seem to be in the 3.4 stable branch? > > Jocke