Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp1230066ybl; Wed, 28 Aug 2019 11:29:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqx3Yn9F+sRpvLwAILlziE/XP3nzWRXqQ8QT2fBOMCqueeStx0iKoPip86RSo3EHSr6vaNlD X-Received: by 2002:aa7:9393:: with SMTP id t19mr6160065pfe.12.1567016973299; Wed, 28 Aug 2019 11:29:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567016973; cv=none; d=google.com; s=arc-20160816; b=j9kNjvTSPnqTSQzJxHfv9Q86EX9vSd7wu/iSUNmbeLjA4TJ3kPsyyFiRB3NBJMDGIr MyfV0POiZY3OiNhgkLNNgjEHrNOAm4+no1I9lekmnwGBqeIDmF3wKdCOrPHjv3EVSaXq h9Zp7MA56YthNqlS+jF1xu0hIYfc3yO60dvkcuQDxFRFnWPOj3MiPdcOYaLX3OCZiQ4Y Bt0Ye8Cllrbrsb/3LH6nHFbxNWZV0ZLGBqwuRanqm3djNzqVIjpmWeVKqV4n65l5vQZn HPFtOTIZH3eQhOKfYtHe0QZgNOolIynPz/CL7/NpgaizVqgqyH9XsRh+OmpSHgVipmcQ 4YwQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:message-id :in-reply-to:date:references:subject:cc:to:from; bh=IxuBfNMAwhdLrSIMqhKQStN/qQruflS9t0Ur5CsTEwo=; b=fGgVMoZzfhszzxfQ8tXoUETLl7YEif9yCpPidrREqL4Epog0/PJW/OEXOKL0+sTUk9 5LcQmprTma2oQOX9ZTm7gJiXVcE3LirBVDckb7ljSALlkEOVjA8pRyqzCDpZb6LBP79k a8b8G3B0aAz6ytWiVPa7lBjSl0SDafWPRk09NmnP1Q8esGnifyutvHwAEEGiLHMFwGqX 6X4LvTlHemcSUum6U+ycqTdKSVaWI8ySfCUULi3twFjaOYRJ7riqxVAOP8a40vJOn+iX JxfTyqgRmjVh/bV53+N/nT4SmcCCzcvbn6ErMHzgZe++7lFUHabDxQ1uJhrYkXboc59Z kWdw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 33si2528527plu.194.2019.08.28.11.29.08; Wed, 28 Aug 2019 11:29:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726592AbfH1S3F (ORCPT + 99 others); Wed, 28 Aug 2019 14:29:05 -0400 Received: from mx1.math.uh.edu ([129.7.128.32]:53356 "EHLO mx1.math.uh.edu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726591AbfH1S3E (ORCPT ); Wed, 28 Aug 2019 14:29:04 -0400 Received: from epithumia.math.uh.edu ([129.7.128.2]) by mx1.math.uh.edu with esmtp (Exim 4.92) (envelope-from ) id 1i32gm-0002ay-RH; Wed, 28 Aug 2019 13:29:03 -0500 Received: by epithumia.math.uh.edu (Postfix, from userid 7225) id BF4D6801554; Wed, 28 Aug 2019 13:29:00 -0500 (CDT) From: Jason L Tibbitts III To: bfields@fieldses.org (J. Bruce Fields) Cc: linux-nfs@vger.kernel.org, km@cm4all.com, linux-kernel@vger.kernel.org Subject: Re: Regression in 5.1.20: Reading long directory fails References: <20190828174609.GB29148@fieldses.org> Date: Wed, 28 Aug 2019 13:29:00 -0500 In-Reply-To: <20190828174609.GB29148@fieldses.org> (J. Bruce Fields's message of "Wed, 28 Aug 2019 13:46:09 -0400") Message-ID: User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.2 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-Spam-Score: -2.9 (--) Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org >>>>> "BF" == J Bruce Fields writes: BF> Looks like that's db531db951f950b8 upstream. (Do you know if it's BF> reproduceable upstream as well?) Yes, it's reproducible up in the 5.3.0 RCs as well. However, while trying to do some further bisecting I ran into an odd problem. Now kernels which were previously working (i.e. 5.1.19 and older) are returning errors, but at a different file count. This only gives me more questions. And so, just to be absolutely sure that there isn't some weird server issue involved, I'm going to try to schedule a reboot of the relevant server. BF> Maybe it depends on having names of the right length to place some BF> bit of xdr on a boundary. I wonder if it'd be possible to reproduce BF> just by varying the name lengths randomly till you hit it. I know I can't reproduce with loads of short names, and with relatively long names as well (using sha256sum as filename generator). BF> No clever debugging ideas off the top of my head, I'm afraid. I BF> might start by patching the kernel or doing some tracing to figure BF> out exactly where that EIO is being generated? If I had any idea how to do that, I happily would. I'm certainly willing to learn. At least I can run strace to see where ls bombs: getdents64(5, 0x7fc13afaf040, 262144) = -1 EIO (Input/output error) bcodding on IRC mentioned that is a rather large count. Does make me wonder if the server is weirding out and sending the client bogus data. Certainly a server reboot, or maybe even just unmounting and remounting the filesystem or copying the data to another filesystem would tell me that. In any case, as soon as I am able to mess with that server, I'll know more. _ J<