Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp1106597ybi; Thu, 30 May 2019 11:40:43 -0700 (PDT) X-Google-Smtp-Source: APXvYqxXEXLDPiRLobHy12bcQChIocmHGUOVXkFPVhQUvo2MNSrntjaV4pbspKEWallBnDhCmooO X-Received: by 2002:a63:4f16:: with SMTP id d22mr5052065pgb.148.1559241643199; Thu, 30 May 2019 11:40:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559241643; cv=none; d=google.com; s=arc-20160816; b=LxMN6JPglBfW4HiJA6gNYGAV29jhqa/LFNEjcF1VlINhKYA0nP0hvUOGn7KtL0uOay 6S93iNVghfzP12o9sICYeo+YlhTA/oC1RxJx/A6CsfHkg5aJNy+QOjIqeUj+xetcu+iq 59GSoh2Td7vISVCAJt/oT7Lbn4qafCmc9pJfbvKJGX+yRihL0AnuWGqobjMvsOAw9IB+ CBo6NJnJIehfHWzN42yOUn0lUwEqv0hdjCQzqwR4JBuctPeT+BXWjXODWqqU5dwKRjyd STGU+Qn94WzI59veGb0YYw9AFTsr1cLeIOWa8B0+8/WhZ11KD15Eqp+qBR7w7jnsh+Ch fHPw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:from:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:date; bh=AnFwhzbxEiJbgCFo+m222+3eIDQ27ycIOQshlG1XX+I=; b=GVN5JLweZr4mc+J1jl7ASPBT1Qrl0YO947tzikX0uqMAAKGNfAkqkBXud1UMQZauQ+ 5+bifALvVMIpFnBt0DosSuzhKaFJaWNTGCFRpHYxAiAEctKP9gUkEdYxhMABcLGzmmlu /nMKJZuAEeXUeLUiSi58rNtSTWG68Vbaa9Nj4PmucACqES2DcyLidm0JKEwUDlfIai7a C7sRbPJUN0j2w8pYRyvJd6XOg8PSj4lV4x2fTO9a0KLPo95wCxeF8dR6lEjQgMB8aCr7 Epy2Q6o0MbZwG23f7AEmw08v74RXLBPSFSytqi5IjKMQdwQ7KGJbA76o7cUUdbd7BiOu 4UZg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z33si3657471pgk.516.2019.05.30.11.40.19; Thu, 30 May 2019 11:40:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726031AbfE3Sj7 (ORCPT + 99 others); Thu, 30 May 2019 14:39:59 -0400 Received: from fieldses.org ([173.255.197.46]:41070 "EHLO fieldses.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726029AbfE3Sj7 (ORCPT ); Thu, 30 May 2019 14:39:59 -0400 Received: by fieldses.org (Postfix, from userid 2815) id 73E6C1E29; Thu, 30 May 2019 14:39:58 -0400 (EDT) Date: Thu, 30 May 2019 14:39:58 -0400 To: Alan Post Cc: "linux-nfs@vger.kernel.org" Subject: Re: User process NFS write hang followed by automount hang requiring reboot Message-ID: <20190530183958.GA23001@fieldses.org> References: <20190520223324.GL4158@turtle.email> <20190521192254.GN4158@turtle.email> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190521192254.GN4158@turtle.email> User-Agent: Mutt/1.5.21 (2010-09-15) From: bfields@fieldses.org (J. Bruce Fields) Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Tue, May 21, 2019 at 01:22:54PM -0600, Alan Post wrote: > On Tue, May 21, 2019 at 03:46:03PM +0000, Trond Myklebust wrote: > > > A representative sample of stack traces from hung user-submitted > > > processes (jobs). The first here is quite a lot more common than > > > the later two: > > > > > > $ sudo cat /proc/197520/stack > > > [<0>] io_schedule+0x12/0x40 > > > [<0>] nfs_lock_and_join_requests+0x309/0x4c0 [nfs] > > > [<0>] nfs_updatepage+0x2a2/0x8b0 [nfs] > > > [<0>] nfs_write_end+0x63/0x4c0 [nfs] > > > [<0>] generic_perform_write+0x138/0x1b0 > > > [<0>] nfs_file_write+0xdc/0x200 [nfs] > > > [<0>] new_sync_write+0xfb/0x160 > > > [<0>] vfs_write+0xa5/0x1a0 > > > [<0>] ksys_write+0x4f/0xb0 > > > [<0>] do_syscall_64+0x53/0x100 > > > [<0>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 > > > [<0>] 0xffffffffffffffff > > > > > > > Have you tried upgrading to 4.19.44? There is a fix that went in not > > too long ago that deals with a request leak that can cause stack traces > > like the above that wait forever. > > > > That I haven't tried. I gather you're talking about either or both > of: > > 63b0ee126f7e > be74fddc976e > > Which I do see went in after 4.19.24 (which I've tried) but didn't > get in 4.20.9 (which I've also tried). Let me see about trying the > 4.19.44 kernel. > > > By the way, the above stack trace with "nfs_lock_and_join_requests" > > usually means that you are using a very small rsize or wsize (less than > > 4k). Is that the case? If so, you might want to look into just > > increasing the I/O size. > > > > These exports have rsize and wsize set to 1048576. Are you getting that from the mount commandline? It could be negotiated down during mount. I think you can get the negotiated values form the rsize= and wsize= values on the opts: line in /proc/self/mountstats. See also /proc/fs/nfsd/max_block_size. --b. > That decision was > before my time, and I'll guess this value was picked to match > NFSSVC_MAXBLKSIZE. > > Thank you for your help, > > -A > -- > Alan Post | Xen VPS hosting for the technically adept > PO Box 61688 | Sunnyvale, CA 94088-1681 | https://prgmr.com/ > email: adp@prgmr.com